Javascript must be enabled to continue!
A Hybridized Immune System for Avoidance of Wormhole Attacks in Manet
View through CrossRef
In Mobile Ad-hoc Networks (MANETs), the most challenging task is detecting and mitigating wormhole links during data transmission between the source and destination nodes. Since it requires special hardware, synchronized clocks, mobile nodes equipped with GPS, etc. To overcome these challenges, Artificial Immune System-based Improved Secure-aware Wormhole Attack Detection (AIS-ISWAD) technique has been proposed that considers maximum end-to-end delay, path length and system parameters for detecting wormhole attacks. To simplify the detection process, AIS has been used as a learning approach that learns those parameters to detect the wormhole links and select an alternative route for transmitting the data packets. However, an uncertainty problem is addressed in AIS during computation of affinity value between antibody and antigen. Also, route selection is still not satisfied since data transmission requires a high-performance stable path from source to destination nodes. Therefore, the main goal of this article is handling the uncertainty problem during affinity computation and selecting the high-performance stable paths to transmit the data. In this paper, a Fuzzy Logic and AIS-ISWAD (FLAIS-ISWAD) technique is proposed to improve the wormhole attack detection and mitigation. In this technique, all computed parameters are given to the FL system to handle the uncertainty problem and construct the high-performance stable paths among all available paths in the network. Also, AIS is applied as a learning method to identify and isolate the wormhole links/nodes in MANETs with the highest network performance. Finally, the performance of the FLAIS-ISWAD technique is evaluated and compared through simulation results in terms of different performance metrics.
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Title: A Hybridized Immune System for Avoidance of Wormhole Attacks in Manet
Description:
In Mobile Ad-hoc Networks (MANETs), the most challenging task is detecting and mitigating wormhole links during data transmission between the source and destination nodes.
Since it requires special hardware, synchronized clocks, mobile nodes equipped with GPS, etc.
To overcome these challenges, Artificial Immune System-based Improved Secure-aware Wormhole Attack Detection (AIS-ISWAD) technique has been proposed that considers maximum end-to-end delay, path length and system parameters for detecting wormhole attacks.
To simplify the detection process, AIS has been used as a learning approach that learns those parameters to detect the wormhole links and select an alternative route for transmitting the data packets.
However, an uncertainty problem is addressed in AIS during computation of affinity value between antibody and antigen.
Also, route selection is still not satisfied since data transmission requires a high-performance stable path from source to destination nodes.
Therefore, the main goal of this article is handling the uncertainty problem during affinity computation and selecting the high-performance stable paths to transmit the data.
In this paper, a Fuzzy Logic and AIS-ISWAD (FLAIS-ISWAD) technique is proposed to improve the wormhole attack detection and mitigation.
In this technique, all computed parameters are given to the FL system to handle the uncertainty problem and construct the high-performance stable paths among all available paths in the network.
Also, AIS is applied as a learning method to identify and isolate the wormhole links/nodes in MANETs with the highest network performance.
Finally, the performance of the FLAIS-ISWAD technique is evaluated and compared through simulation results in terms of different performance metrics.
Related Results
EPD Electronic Pathogen Detection v1
EPD Electronic Pathogen Detection v1
Electronic pathogen detection (EPD) is a non - invasive, rapid, affordable, point- of- care test, for Covid 19 resulting from infection with SARS-CoV-2 virus. EPD scanning techno...
Wormhole Attack Detection System for IoT Network: A Hybrid Approach
Wormhole Attack Detection System for IoT Network: A Hybrid Approach
Abstract
Many errors in data communication cause security attacks in Internet of Things (IoT). Routing errors which are prominent errors in IoT, degrade the quality of data...
Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks
Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks
Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, th...
How Does Psilocybin Therapy Work? an Exploration of Experiential Avoidance as a Putative Mechanism of Change
How Does Psilocybin Therapy Work? an Exploration of Experiential Avoidance as a Putative Mechanism of Change
Although psilocybin therapy is currently receiving attention as a novel intervention for a wide range of mental health concerns, limited research has examined the underlying psycho...
Avoiding at all costs? An exploration of avoidance costs in a novel Virtual Reality procedure
Avoiding at all costs? An exploration of avoidance costs in a novel Virtual Reality procedure
Approach-avoidance behaviours play a major role in the development and maintenance of anxiety disorders as repeated avoidance behaviours are assumed to prevent fear extinction. App...
Experimental Investigation of Particulate Polylactic Acid Diversion in Matrix Acidizing
Experimental Investigation of Particulate Polylactic Acid Diversion in Matrix Acidizing
Abstract
Polylactic Acid (PLA) is increasingly used in the oil industry and specifically for diversion in matrix acidizing as evidenced by a number of field cases re...
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security th...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...

