Open Access iconOpen Access

ARTICLE

Dipper Throated Optimization for Detecting Black-Hole Attacks in MANETs

Reem Alkanhel1, El-Sayed M. El-kenawy2,3, Abdelaziz A. Abdelhamid4,5, Abdelhameed Ibrahim6, Mostafa Abotaleb7, Doaa Sami Khafaga8,*

1 Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia
2 Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura, 35111, Egypt
3 Faculty of Artificial Intelligence, Delta University for Science and Technology, Mansoura, 35712, Egypt
4 Department of Computer Science, Faculty of Computer and Information Sciences, Ain Shams University, Cairo, 11566, Egypt
5 Department of Computer Science, College of Computing and Information Technology, Shaqra University, 11961, Saudi Arabia
6 Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura, 35516, Egypt
7 Department of System Programming, South Ural State University, Chelyabinsk, 454080, Russia
8 Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia

* Corresponding Author: Doaa Sami Khafaga. Email: email

Computers, Materials & Continua 2023, 74(1), 1905-1921. https://doi.org/10.32604/cmc.2023.032157

Abstract

In terms of security and privacy, mobile ad-hoc network (MANET) continues to be in demand for additional debate and development. As more MANET applications become data-oriented, implementing a secure and reliable data transfer protocol becomes a major concern in the architecture. However, MANET’s lack of infrastructure, unpredictable topology, and restricted resources, as well as the lack of a previously permitted trust relationship among connected nodes, contribute to the attack detection burden. A novel detection approach is presented in this paper to classify passive and active black-hole attacks. The proposed approach is based on the dipper throated optimization (DTO) algorithm, which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’ quality of service. A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron (DTO-MLP), and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical (LEACH) clustering technique. MLP is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights of minor features. This hybrid method is primarily designed to combat active black-hole assaults. Using the LEACH clustering phase, however, can also detect passive black-hole attacks. The effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested approach. For diverse mobility situations, the results demonstrate up to 97% detection accuracy and faster execution time. Furthermore, the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.

Keywords


Cite This Article

APA Style
Alkanhel, R., El-kenawy, E.M., Abdelhamid, A.A., Ibrahim, A., Abotaleb, M. et al. (2023). Dipper throated optimization for detecting black-hole attacks in manets. Computers, Materials & Continua, 74(1), 1905-1921. https://doi.org/10.32604/cmc.2023.032157
Vancouver Style
Alkanhel R, El-kenawy EM, Abdelhamid AA, Ibrahim A, Abotaleb M, Khafaga DS. Dipper throated optimization for detecting black-hole attacks in manets. Comput Mater Contin. 2023;74(1):1905-1921 https://doi.org/10.32604/cmc.2023.032157
IEEE Style
R. Alkanhel, E.M. El-kenawy, A.A. Abdelhamid, A. Ibrahim, M. Abotaleb, and D.S. Khafaga, “Dipper Throated Optimization for Detecting Black-Hole Attacks in MANETs,” Comput. Mater. Contin., vol. 74, no. 1, pp. 1905-1921, 2023. https://doi.org/10.32604/cmc.2023.032157



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1059

    View

  • 695

    Download

  • 0

    Like

Share Link