banner

Performance optimization of multipath K-AOMDV protocol using SVM against blackhole attack

Sheetal Kaushik, Khushboo Tripathi, Rashmi Gupta, Prerna Mahajan

Abstract


This research focuses on the Ad Hoc On-Demand Multi-Path Routing (AOMDV) protocol, which is preferred for its improved efficiency compared to a single-path routing protocol in mobile ad hoc networks (MANETs). However, identifying attackers in such networks is a complicated task due to malicious nodes providing optimistic, forward-looking optimistic responses. In this study, the author proposes a novel security solution, the K-AOMDV (KNN- Ad Hoc On-Demand Multi-Path Routing protocol) that uses K-means clustering to prevent routing misbehaviour. The efficiency of the proposed K-AOMDV routing protocol is analyzed using supervised machine learning approach to predict optimal routes with minimal packet hops between nodes. The proposed algorithm has a high accuracy rate of 0.99%, 80% true positives, and 80% recall. It communicates the black hole attacker’s node identification (ID) into the network, ensuring that the attacker will not participate in the routing method in the future. The privacy domain in MANET is the main focus of this research, and the proposed solution affiliates an effective approach to enhancing the security of MANETs.


Keywords


K-AOMDV; blackhole attack; MANET; reinforcement learning; SVM; K-NN

Full Text:

PDF

References


1. S. Raj J. Machine Learning Based Resourceful Clustering With Load Optimization for Wireless Sensor Networks. 2020, 2(1): 29-38. doi: 10.36548/jucct.2020.1.004

2. Yasin A, Abu Zant M. Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique. Wireless Communications and Mobile Computing. 2018, 2018: 1-10. doi: 10.1155/2018/9812135

3. Hossain S, Hussain MdS, Ema RR, et al. Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET. 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 2019. doi: 10.1109/icccnt45670.2019.8944395

4. Tami A, Boukli Hacene S, Ali Cherif M. Detection and Prevention of Blackhole Attack in the AOMDV Routing Protocol. Journal of Communications Software and Systems. 2021, 17(1): 1-12. doi: 10.24138/jcomss.v17i1.945

5. Bhardwaj AK. Machine Learning based Power Efficient Optimized Communication Ensemble Model with Intelligent Fog Computing for W.S.N.s. 2022.

6. Abdan M, Seno SAH. Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET). Wireless Communications and Mobile Computing. 2022, 2022: 1-12. doi: 10.1155/2022/2375702

7. Sivanesan N, Archana KS. A machine learning approach to detect network layer attacks in mobile ad hoc networks. International Journal of Early Childhood. 2022, 14(3).

8. Alsarhan A, Alauthman M, Alshdaifat E, et al. Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing. 2021, 14(5): 6113-6122. doi: 10.1007/s12652-021-02963-x

9. Rajendran A, Balakrishnan N, P A. Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks. Ad Hoc Networks. 2022, 126: 102757. doi: 10.1016/j.adhoc.2021.102757

10. Chen L, Hu B, Guan ZH, et al. Multiagent Meta-Reinforcement Learning for Adaptive Multipath Routing Optimization. IEEE Transactions on Neural Networks and Learning Systems. 2022, 33(10): 5374-5386. doi: 10.1109/tnnls.2021.3070584

11. Guo W, Yan C, Lu T. Optimizing the lifetime of wireless sensor networks via reinforcement-learning-based routing. International Journal of Distributed Sensor Networks. 2019, 15(2): 155014771983354. doi: 10.1177/1550147719833541

12. Kaushik S, Tripathi K, Gupta R, et al. Performance Analysis of AODV and SAODV Routing Protocol using SVM against Black Hole Attack. 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM). 2022. doi: 10.1109/iciptm54933.2022.9754166

13. Kaushik S, Tripathi K, Gupta R, et al. Futuristic Analysis of Machine Learning Based Routing Protocols in Wireless Ad Hoc Networks. 2021 Fourth International Conference on Computational Intelligence and Communication Technologies (CCICT). 2021. doi: 10.1109/ccict53244.2021.00067

14. B PR, B BR, B D. The AODV routing protocol with built-in security to counter blackhole attack in MANET. Materials Today: Proceedings. 2022, 50: 1152-1158. doi: 10.1016/j.matpr.2021.08.039

15. Benatia SE, Smail O, Meftah B, et al. A reliable multipath routing protocol based on link quality and stability for MANETs in urban areas. Simulation Modelling Practice and Theory. 2021, 113: 102397. doi: 10.1016/j.simpat.2021.102397

16. Bhole K, Agashe S, Wadgaonkar J. How Expert is EXPERT for Fuzzy Logic-Based System! International Proceedings on Advances in Soft Computing, Intelligent Systems and Applications. 2017: 29-36. doi: 10.1007/978-981-10-5272-9_3

17. Mirza S, Gujarathi T, Bhole K. Cardiovascular Risk Assessment Using Intuitionistic Fuzzy Logic System. 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 2019. doi: 10.1109/icccnt45670.2019.8944853

18. Rad D, Rad G, Maier R, et al. A fuzzy logic modelling approach on psychological data. Journal of Intelligent & Fuzzy Systems. 2022, 43(2): 1727-1737. doi: 10.3233/jifs-219274

19. Michael J, Garbade J. Understanding k-means clustering in machine learning. 2019.

20. Khan M, Khaeel U, Ramesh KS. Effect on Packet Delivery Ratio (PDR) & Throughput in Wireless Sensor Networks Due to Black Hole Attack. Int. J. Innov. Technol. Explor. 2019, 8(12S): 428-432. doi: 10.35940/ijitee.l1107.10812s19




DOI: https://doi.org/10.32629/jai.v7i5.1488

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Sheetal Kaushik, Khushboo Tripathi, Rashmi Gupta, Prerna Mahajan

License URL: https://creativecommons.org/licenses/by-nc/4.0/