2021
DOI: 10.1108/ijius-09-2020-0049
|View full text |Cite|
|
Sign up to set email alerts
|

Intrusion detection in mobile ad-hoc network using Hybrid Reactive Search and Bat algorithm

Abstract: PurposeThe mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the mobile ad-hoc network (MANET). In this paper, worm-hole and other destructive malignant attacks are propelled in MANET.Design/methodology/approachA wireless ad-hoc network also called as mobile ad-hoc network (MANET) is a gathering of hubs that utilizes a wireless channel to exchange information and coordinate together to establish informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…These networks are composed of resource-limited (memory, CPU, bandwidth, battery), low-cost, and small nodes that perform communication in a wireless manner (Akyildiz et al , 2002; Chen et al , 2009; Islabudeen and Kavitha Devi, 2020). The communication between the source node and the destination node is performed with in the limited communication range (Krishnan et al , 2020; Srilakshmi and Muthukuru, 2021). The hostile deployment environments, the quick deployment practices, the absence of infrastructure, and the broad mind of the wireless communication provide the sensor networks susceptible to a wide variety of security related attacks, mostly aiming the data or control traffic (Roman et al , 2006).…”
Section: Introductionmentioning
confidence: 99%
“…These networks are composed of resource-limited (memory, CPU, bandwidth, battery), low-cost, and small nodes that perform communication in a wireless manner (Akyildiz et al , 2002; Chen et al , 2009; Islabudeen and Kavitha Devi, 2020). The communication between the source node and the destination node is performed with in the limited communication range (Krishnan et al , 2020; Srilakshmi and Muthukuru, 2021). The hostile deployment environments, the quick deployment practices, the absence of infrastructure, and the broad mind of the wireless communication provide the sensor networks susceptible to a wide variety of security related attacks, mostly aiming the data or control traffic (Roman et al , 2006).…”
Section: Introductionmentioning
confidence: 99%
“…Their application of autoencoders with the Modbus TCP protocol yielded an impressive F1 score of 98.36%. Similarly, [11][12][13] introduced an unsupervised Attention-based ConvLSTM Autoencoder with a Dynamic Thresholding (ACLAE-DT) framework for handling multivariate time series anomalies. By processing the data and creating feature images, they utilized an attention-based ConvLSTM autoencoder to discern temporal behaviors, achieving AD through dynamic thresholding of reconstruction errors [14][15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…SVM uses a hyperplane, a subset of supervised machine learning, to determine the best classification for each observation in a given data set. SVM is more effective with big datasets and can handle linear and non-linear problems [25]. SVM is incorporated into WSNs to handle various challenges, including congestion control, fault detection, routing, communication, and localization concerns.…”
Section: B Support Vector Machine (Svm)mentioning
confidence: 99%