2020
DOI: 10.1109/access.2020.3004692
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of Black Hole and Gray Hole Attack Using Swarm Inspired Algorithm With Artificial Neural Network

Abstract: Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad Hoc network (MANET), which is a collection of mobile nodes that are communicating with each other without requiring any fixed infrastructure. Due to the dynamic nature with a decentralized system, these networks are susceptible to different attacks such as Black Hole Attack (BHA), Gray Hole Attack (GHA), Sink Hole Attack (SHA) and many more. Several researchers have worked for the detection and mitigation of individual a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
31
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 74 publications
(31 citation statements)
references
References 47 publications
0
31
0
Order By: Relevance
“…The scheme can detect black hole attacks and selective forwarding attacks with high accuracy without depleting the nodes of their energy. [35] proposed a protection mechanism against black hole and selective forwarding attacks based on an artificial neural network as a deep learning algorithm along with the swarmbased artificial bee colony optimization technique. The mechanism performs better in contrast to others under black holes as well as selective forwarding attack condition for a mobile ad hoc network.…”
Section: Ai-based Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…The scheme can detect black hole attacks and selective forwarding attacks with high accuracy without depleting the nodes of their energy. [35] proposed a protection mechanism against black hole and selective forwarding attacks based on an artificial neural network as a deep learning algorithm along with the swarmbased artificial bee colony optimization technique. The mechanism performs better in contrast to others under black holes as well as selective forwarding attack condition for a mobile ad hoc network.…”
Section: Ai-based Schemesmentioning
confidence: 99%
“…But the transient fluctuation of channels may result in the rapid change of the threshold values, and then draw mistake detection results. The AI-based detection schemes [34][35][36][37][38][39][40][41][42][43][44][45] find malicious nodes by actively learning their malicious behaviors which are different from those of normal nodes. But these schemes need a long learning process or game process to model the malicious behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…Some malicious attacks can re-transmit RREQ and RREP (e.g. gray hole attacks [14]), however, these types of attacks have a different impact on the network to BH attacks and require different detection methods. The current work focus on BH attacks exclusively.…”
Section: Rrep Construction and Collectionmentioning
confidence: 99%
“…The main research contributions of proposed work are as follows: We proposed a prediction model called attention‐based convolution neural network 12 long short‐term memory (attention‐based CNN‐LSTM) model for flow prediction. Attention‐based concept improves the prediction accuracy 13 by learning the significance of preceding traffic flow automatically. This method considers the spatial and temporal characteristics of traffic data with the help of CNN and LSTM. The model is designed with three 1D CNN with leaky rectified linear unit (ReLU) activation function and three LSTM layers with each layer having neurons such as 128, 64, and 64.…”
Section: Introductionmentioning
confidence: 99%