22
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Auto metric graph neural network optimized with woodpecker mating algorithm for detecting network layer attacks in mobile ad hoc networks

&
Pages 305-318 | Received 11 Sep 2023, Accepted 28 Feb 2024, Published online: 13 Mar 2024

References

  • Mohammadi P, Ghaffari A. Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Pers Commun. 2019;106(2):365–76. doi: 10.1007/s11277-019-06166-8
  • Shajin FH, Rajesh P, Raja MR. An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC. Circuit Syst Signal Proc. 2022;41(3):1–24. doi: 10.1007/s00034-021-01850-2
  • Shajin FH, Salini P, Rajesh P, et al. Efficient framework for brain tumour classification using hierarchical deep learning neural network classifier. Comput Methods Biomech Biomed Eng: Imaging Vis. 2023;11(3):750–7. doi: 10.1080/21681163.2022.2111719
  • Rajesh P, Shajin FH, Kumaran GK. An efficient IWOLRS control technique of brushless DC motor for torque ripple minimization. Appl Sci And Engi Prog. 2022;15(3):5514–. doi: 10.14416/j.asep.2021.10.004
  • Rajesh P, Shajin FH, Kannayeram G. A novel intelligent technique for energy management in smart home using internet of things. Appl Soft Comput. 2022;128:109442. doi: 10.1016/j.asoc.2022.109442
  • Jagadeesan S, Parthasarathy V. RETRACTED ARTICLE: design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment. Cluster Comput. 2019;22(Suppl 1):299–310. doi: 10.1007/s10586-018-1825-8
  • Karthigha M, Latha L, Sripriyan K. A comprehensive survey of routing attacks in wireless mobile ad hoc networks. In: 2020 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India; 2020; IEEE. p. 396–402.
  • Uthumansa A, Shantha F. Identifying the impacts of active and passive attacks on network layer in a mobile ad-hoc network: a simulation perspective. International Journal of Advanced Computer Science and Applications (IJACSA); 2005.
  • Sivanesh S, Dhulipala VS. Accurate and cognitive intrusion detection system (ACIDS): a novel black hole detection mechanism in mobile ad hoc networks. Mobile Netw Appl. 2021;26(4):1696–1704. doi: 10.1007/s11036-019-01505-2
  • Nishanth N, Mujeeb A. Modeling and detection of flooding-based denial-of-service attack in wireless ad hoc network using Bayesian inference. IEEE Syst J. 2020;15(1):17–26. doi: 10.1109/JSYST.2020.2984797
  • Poongodi T, Khan MS, Patan R, et al. Robust defense scheme against selective drop attack in wireless ad hoc networks. IEEE Access. 2019;7:18409–19. doi: 10.1109/ACCESS.2019.2896001
  • Tarundhamor, CICIDS 2019 dataset, Kaggle. 2021 [cited 2022 May 19]. Available from: https://www.kaggle.com/tarundhamor/cicids-2019-dataset
  • Gao XW, Zheng YT, Fantuzzi N. Local least–squares element differential method for solving heat conduction problems in composite structures. Numer Heat Transf B: Fundam. 2020;77(6):441–60. doi: 10.1080/10407790.2020.1746584
  • Song X, Mao M, Qian X. Auto-metric graph neural network based on a meta-learning strategy for the diagnosis of Alzheimer’s disease. IEEE J Biomed Health Inform. 2021;25(8):3141–3152. doi: 10.1109/JBHI.2021.3053568
  • Karimzadeh Parizi M, Keynia F, Khatibi Bardsiri A. OWMA: an improved self-regulatory woodpecker mating algorithm using opposition-based learning and allocation of local memory for solving optimization problems. J Int Fuzzy Syst. 2021;40(1):919–946. doi: 10.3233/JIFS-201075
  • Hnamte V, Hussain J. Dependable intrusion detection system using deep convolutional neural network: a novel framework and performance evaluation approach. Telemat Informat Rep. 2023;11:100077. doi: 10.1016/j.teler.2023.100077
  • Meddeb R, Jemili F, Triki B, et al. A deep learning-based intrusion detection approach for mobile Ad-hoc network. Soft Comput. 2023;27(14):1–5.
  • Maseer ZK, Yusof R, Bahaman N, et al. Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset. IEEE Access. 2021;9:22351–22370. doi: 10.1109/ACCESS.2021.3056614
  • Al-Yaseen WL, Idrees AK. MuDeLA: multi-level deep learning approach for intrusion detection systems. Int J Comput Appl. 2023;45(12):1–9. doi: 10.1080/1206212X.2023.2275084
  • Rajendran A, Balakrishnan N, Ajay P. Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks. Ad Hoc Networks. 2022;126:102757. doi: 10.1016/j.adhoc.2021.102757
  • Farahani G, Chaudhry SA. Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Networks. 2021;2021:1–5. doi: 10.1155/2021/8814141
  • Tahboush M, Agoyi M. A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access. 2021;9:11872–83. doi: 10.1109/ACCESS.2021.3051491

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.