Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (29)

Search Parameters:
Keywords = black hole attacks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
33 pages, 1020 KiB  
Article
Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks
by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler and Ricardo E. Pérez Guzmán
Sensors 2025, 25(7), 2056; https://doi.org/10.3390/s25072056 - 26 Mar 2025
Cited by 1 | Viewed by 1194
Abstract
The increasing prevalence of cyber threats in wireless sensor networks (WSNs) necessitates adaptive and efficient security mechanisms to ensure robust data transmission while addressing resource constraints. This paper proposes a reinforcement learning-based adaptive encryption framework that dynamically scales encryption levels based on real-time [...] Read more.
The increasing prevalence of cyber threats in wireless sensor networks (WSNs) necessitates adaptive and efficient security mechanisms to ensure robust data transmission while addressing resource constraints. This paper proposes a reinforcement learning-based adaptive encryption framework that dynamically scales encryption levels based on real-time network conditions and threat classification. The proposed model leverages a deep learning-based anomaly detection system to classify network states into low, moderate, or high threat levels, which guides encryption policy selection. The framework integrates dynamic Q-learning for optimizing energy efficiency in low-threat conditions and double Q-learning for robust security adaptation in high-threat environments. A Hybrid Policy Derivation Algorithm is introduced to balance encryption complexity and computational overhead by dynamically switching between these learning models. The proposed system is formulated as a Markov Decision Process (MDP), where encryption level selection is driven by a reward function that optimizes the trade-off between energy efficiency and security robustness. The adaptive learning strategy employs an ϵ-greedy exploration-exploitation mechanism with an exponential decay rate to enhance convergence in dynamic WSN environments. The model also incorporates a dynamic hyperparameter tuning mechanism that optimally adjusts learning rates and exploration parameters based on real-time network feedback. Experimental evaluations conducted in a simulated WSN environment demonstrate the effectiveness of the proposed framework, achieving a 30.5% reduction in energy consumption, a 92.5% packet delivery ratio (PDR), and a 94% mitigation efficiency against multiple cyberattack scenarios, including DDoS, black-hole, and data injection attacks. Additionally, the framework reduces latency by 37% compared to conventional encryption techniques, ensuring minimal communication delays. These results highlight the scalability and adaptability of reinforcement learning-driven adaptive encryption in resource-constrained networks, paving the way for real-world deployment in next-generation IoT and WSN applications. Full article
Show Figures

Figure 1

22 pages, 1246 KiB  
Article
SROR: A Secure and Reliable Opportunistic Routing for VANETs
by Huibin Xu and Ying Wang
Vehicles 2024, 6(4), 1730-1751; https://doi.org/10.3390/vehicles6040084 - 30 Sep 2024
Viewed by 1622
Abstract
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, [...] Read more.
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, the relative velocity, connectivity probability, and packet forwarding ratio are taken into consideration. The aim of SROR is to maximally improve the packet delivery ratio as well as reduce the end-to-end delay. The selection of a relay node from CFNs is formalized as a Markov Decision Process (MDP) optimization. The SROR algorithm extracts useful knowledge from historical behavior of nodes by interacting with the environment. This useful knowledge are utilized to select the relay node as well as to prevent the malicious nodes from forwarding packets. In addition, the influence of different learning rate and exploratory factor policy on rewards of agents are analyzed. The experimental results show that the performance of SROR outperforms the benchmarks in terms of the packet delivery ratio, end-to-end delay, and attack success ratio. As vehicle density ranges from 10 to 50 and percentage of malicious vehicles is fixed at 10%, the average of packet delivery ratio, end-to-end delay, and attack success ratio are 0.82, 0.26s, and 0.37, respectively, outperforming benchmark protocols. Full article
Show Figures

Figure 1

13 pages, 433 KiB  
Article
Developing a Hybrid Detection Approach to Mitigating Black Hole and Gray Hole Attacks in Mobile Ad Hoc Networks
by Mohammad Yazdanypoor, Stefano Cirillo and Giandomenico Solimando
Appl. Sci. 2024, 14(17), 7982; https://doi.org/10.3390/app14177982 - 6 Sep 2024
Cited by 5 | Viewed by 1521
Abstract
Mobile ad hoc networks (MANETs) have revolutionized wireless communications by enabling dynamic, infrastructure-free connectivity across various applications, from disaster recovery to military operations. However, these networks are highly vulnerable to security threats, particularly black hole and gray hole attacks, which can severely disrupt [...] Read more.
Mobile ad hoc networks (MANETs) have revolutionized wireless communications by enabling dynamic, infrastructure-free connectivity across various applications, from disaster recovery to military operations. However, these networks are highly vulnerable to security threats, particularly black hole and gray hole attacks, which can severely disrupt network performance and reliability. This study addresses the critical challenge of detecting and mitigating these attacks within the framework of the dynamic source routing (DSR) protocol. To tackle this issue, we propose a robust hybrid detection method that significantly enhances the identification and mitigation of black hole and gray hole attacks. Our approach integrates anomaly detection, advanced data mining techniques, and cryptographic verification to establish a multi-layered defense mechanism. Extensive simulations demonstrate that the proposed hybrid method achieves superior detection accuracy, reduces false positives, and maintains high packet delivery ratios even under attack conditions. Compared to existing solutions, this method provides more reliable and resilient network performance, dynamically adapting to evolving threats. This research represents a significant advancement in MANET security, offering a scalable and effective solution for safeguarding critical MANET applications against sophisticated cyber-attacks. Full article
(This article belongs to the Special Issue Data Security in IoT Networks)
Show Figures

Figure 1

18 pages, 475 KiB  
Article
Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs)
by Iain Baird, Isam Wadhaj, Baraq Ghaleb and Craig Thomson
Electronics 2024, 13(16), 3314; https://doi.org/10.3390/electronics13163314 - 21 Aug 2024
Cited by 3 | Viewed by 2714
Abstract
Mobile ad hoc networks (MANETs) offer a decentralized communication solution ideal for infrastructure-less environments like disaster relief zones. However, their inherent lack of central control and dynamic topology make them vulnerable to attacks. This paper examines the impact of various attacks on mobile [...] Read more.
Mobile ad hoc networks (MANETs) offer a decentralized communication solution ideal for infrastructure-less environments like disaster relief zones. However, their inherent lack of central control and dynamic topology make them vulnerable to attacks. This paper examines the impact of various attacks on mobile nodes within two network types: randomly and uniformly distributed stationary networks. Four types of attacks are investigated: delay, dropping, sinkhole (alone), and a combined black hole attack (dropping + sinkhole). The effects of these attacks are compared using the packet delivery ratio, throughput, and end-to-end delay. The evaluation results show that all single attacks negatively impacted network performance, with the random network experiencing the most significant degradation. Interestingly, the combined black hole attack, while more disruptive than any single attack, affected the uniformly distributed network more severely than the random network. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

19 pages, 3451 KiB  
Article
A Cooperative Intrusion Detection System for the Internet of Things Using Convolutional Neural Networks and Black Hole Optimization
by Peiyu Li, Hui Wang, Guo Tian and Zhihui Fan
Sensors 2024, 24(15), 4766; https://doi.org/10.3390/s24154766 - 23 Jul 2024
Cited by 6 | Viewed by 1906
Abstract
Maintaining security in communication networks has long been a major concern. This issue has become increasingly crucial due to the emergence of new communication architectures like the Internet of Things (IoT) and the advancement and complexity of infiltration techniques. For usage in networks [...] Read more.
Maintaining security in communication networks has long been a major concern. This issue has become increasingly crucial due to the emergence of new communication architectures like the Internet of Things (IoT) and the advancement and complexity of infiltration techniques. For usage in networks based on the Internet of Things, previous intrusion detection systems (IDSs), which often use a centralized design to identify threats, are now ineffective. For the resolution of these issues, this study presents a novel and cooperative approach to IoT intrusion detection that may be useful in resolving certain current security issues. The suggested approach chooses the most important attributes that best describe the communication between objects by using Black Hole Optimization (BHO). Additionally, a novel method for describing the network’s matrix-based communication properties is put forward. The inputs of the suggested intrusion detection model consist of these two feature sets. The suggested technique splits the network into a number of subnets using the software-defined network (SDN). Monitoring of each subnet is done by a controller node, which uses a parallel combination of convolutional neural networks (PCNN) to determine the presence of security threats in the traffic passing through its subnet. The proposed method also uses the majority voting approach for the cooperation of controller nodes in order to more accurately detect attacks. The findings demonstrate that, in comparison to the prior approaches, the suggested cooperative strategy can detect assaults in the NSLKDD and NSW-NB15 datasets with an accuracy of 99.89 and 97.72 percent, respectively. This is a minimum 0.6 percent improvement. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

22 pages, 4332 KiB  
Article
Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks
by Muhammad Ali Khan, Rao Naveed Bin Rais, Osman Khalid and Sanan Ahmad
Sensors 2024, 24(6), 1775; https://doi.org/10.3390/s24061775 - 9 Mar 2024
Cited by 3 | Viewed by 2255
Abstract
The Internet of Things (IoT) is empowering various sectors and aspects of daily life. Green IoT systems typically involve Low-Power and Lossy Networks (LLNs) with resource-constrained nodes. Lightweight routing protocols, such as the Routing Protocol for Low-Power and Lossy Networks (RPL), are increasingly [...] Read more.
The Internet of Things (IoT) is empowering various sectors and aspects of daily life. Green IoT systems typically involve Low-Power and Lossy Networks (LLNs) with resource-constrained nodes. Lightweight routing protocols, such as the Routing Protocol for Low-Power and Lossy Networks (RPL), are increasingly being applied for efficient communication in LLNs. However, RPL is susceptible to various attacks, such as the black hole attack, which compromises network security. The existing black hole attack detection methods in Green IoT rely on static thresholds and unreliable metrics to compute trust scores. This results in increasing false positive rates, especially in resource-constrained IoT environments. To overcome these limitations, we propose a delta-threshold-based trust model called the Optimized Reporting Module (ORM) to mitigate black hole attacks in Green IoT systems. The proposed scheme comprises both direct trust and indirect trust and utilizes a forgetting curve. Direct trust is derived from performance metrics, including honesty, dishonesty, energy, and unselfishness. Indirect trust requires the use of similarity. The forgetting curve provides a mechanism to consider the most significant and recent feedback from direct and indirect trust. To assess the efficacy of the proposed scheme, we compare it with the well-known trust-based attack detection scheme. Simulation results demonstrate that the proposed scheme has a higher detection rate and low false positive alarms compared to the existing scheme, confirming the applicability of the proposed scheme in green IoT systems. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

23 pages, 4031 KiB  
Article
Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks
by Shafiullah Khan, Muhammad Altaf Khan and Noha Alnazzawi
Sensors 2024, 24(5), 1641; https://doi.org/10.3390/s24051641 - 2 Mar 2024
Cited by 9 | Viewed by 3155
Abstract
Wireless sensor networks (WSNs) are essential in many areas, from healthcare to environmental monitoring. However, WSNs are vulnerable to routing attacks that might jeopardize network performance and data integrity due to their inherent vulnerabilities. This work suggests a unique method for enhancing WSN [...] Read more.
Wireless sensor networks (WSNs) are essential in many areas, from healthcare to environmental monitoring. However, WSNs are vulnerable to routing attacks that might jeopardize network performance and data integrity due to their inherent vulnerabilities. This work suggests a unique method for enhancing WSN security through the detection of routing threats using feed-forward artificial neural networks (ANNs). The proposed solution makes use of ANNs’ learning capabilities to model the network’s dynamic behavior and recognize routing attacks like black-hole, gray-hole, and wormhole attacks. CICIDS2017 is a heterogeneous dataset that was used to train and test the proposed system in order to guarantee its robustness and adaptability. The system’s ability to recognize both known and novel attack patterns enhances its efficacy in real-world deployment. Experimental assessments using an NS2 simulator show how well the proposed method works to improve routing protocol security. The proposed system’s performance was assessed using a confusion matrix. The simulation and analysis demonstrated how much better the proposed system performs compared to the existing methods for routing attack detection. With an average detection rate of 99.21% and a high accuracy of 99.49%, the proposed system minimizes the rate of false positives. The study advances secure communication in WSNs and provides a reliable means of protecting sensitive data in resource-constrained settings. Full article
(This article belongs to the Special Issue Artificial Intelligence-Enabled Security and Privacy for IoT)
Show Figures

Figure 1

34 pages, 8743 KiB  
Article
ANN-Based Intelligent Secure Routing Protocol in Vehicular Ad Hoc Networks (VANETs) Using Enhanced AODV
by Mahmood ul Hassan, Amin A. Al-Awady, Abid Ali, Sifatullah, Muhammad Akram, Muhammad Munwar Iqbal, Jahangir Khan and Yahya Ali Abdelrahman Ali
Sensors 2024, 24(3), 818; https://doi.org/10.3390/s24030818 - 26 Jan 2024
Cited by 25 | Viewed by 4424
Abstract
A vehicular ad hoc network (VANET) is a sophisticated wireless communication infrastructure incorporating centralized and decentralized control mechanisms, orchestrating seamless data exchange among vehicles. This intricate communication system relies on the advanced capabilities of 5G connectivity, employing specialized topological arrangements to enhance data [...] Read more.
A vehicular ad hoc network (VANET) is a sophisticated wireless communication infrastructure incorporating centralized and decentralized control mechanisms, orchestrating seamless data exchange among vehicles. This intricate communication system relies on the advanced capabilities of 5G connectivity, employing specialized topological arrangements to enhance data packet transmission. These vehicles communicate amongst themselves and establish connections with roadside units (RSUs). In the dynamic landscape of vehicular communication, disruptions, especially in scenarios involving high-speed vehicles, pose challenges. A notable concern is the emergence of black hole attacks, where a vehicle acts maliciously, obstructing the forwarding of data packets to subsequent vehicles, thereby compromising the secure dissemination of content within the VANET. We present an intelligent cluster-based routing protocol to mitigate these challenges in VANET routing. The system operates through two pivotal phases: first, utilizing an artificial neural network (ANN) model to detect malicious nodes, and second, establishing clusters via enhanced clustering algorithms with appointed cluster heads (CH) for each cluster. Subsequently, an optimal path for data transmission is predicted, aiming to minimize packet transmission delays. Our approach integrates a modified ad hoc on-demand distance vector (AODV) protocol for on-demand route discovery and optimal path selection, enhancing request and reply (RREQ and RREP) protocols. Evaluation of routing performance involves the BHT dataset, leveraging the ANN classifier to compute accuracy, precision, recall, F1 score, and loss. The NS-2.33 simulator facilitates the assessment of end-to-end delay, network throughput, and hop count during the path prediction phase. Remarkably, our methodology achieves 98.97% accuracy in detecting black hole attacks through the ANN classification model, outperforming existing techniques across various network routing parameters. Full article
Show Figures

Figure 1

13 pages, 396 KiB  
Article
Preventing Black Hole Attacks in AODV Using RREQ Packets
by Yujin Nakano and Tomofumi Matsuzawa
Network 2023, 3(4), 469-481; https://doi.org/10.3390/network3040020 - 7 Oct 2023
Cited by 2 | Viewed by 2069
Abstract
Ad hoc networks, formed by multiple wireless communication devices without any connection to wired or intermediary devices such as by access points, are widely used in various situations to construct flexible networks that are not restricted by communication facilities. Ad hoc networks can [...] Read more.
Ad hoc networks, formed by multiple wireless communication devices without any connection to wired or intermediary devices such as by access points, are widely used in various situations to construct flexible networks that are not restricted by communication facilities. Ad hoc networks can rarely use existing infrastructure, and no authentication infrastructure is included in these networks as a trusted third party. Hence, distinguishing between ordinary and malicious terminals can be challenging. As a result, black hole attacks are among the most serious security threats to Ad hoc On-demand Distance Vector (AODV) routing, which is one of the most popular routing protocols in mobile ad hoc networks. In this study, we propose a defense method against black hole attacks in which malicious nodes are actively detected to prevent attacks. We applied the proposed method to a network containing nodes engaging in black hole attacks, confirming that the network’s performance is dramatically improved compared to a network without the proposed method. Full article
Show Figures

Figure 1

20 pages, 9476 KiB  
Article
Incremental Online Machine Learning for Detecting Malicious Nodes in Vehicular Communications Using Real-Time Monitoring
by Souad Ajjaj, Souad El Houssaini, Mustapha Hain and Mohammed-Alamine El Houssaini
Telecom 2023, 4(3), 629-648; https://doi.org/10.3390/telecom4030028 - 11 Sep 2023
Cited by 5 | Viewed by 2436
Abstract
Detecting malicious activities in Vehicular Ad hoc Networks (VANETs) is an important research field as it can prevent serious damage within the network and enhance security and privacy. In this regard, a number of approaches based on machine learning (ML) algorithms have been [...] Read more.
Detecting malicious activities in Vehicular Ad hoc Networks (VANETs) is an important research field as it can prevent serious damage within the network and enhance security and privacy. In this regard, a number of approaches based on machine learning (ML) algorithms have been proposed. However, they encounter several challenges due to data being constantly generated over time; this can impact the performance of models trained on fixed datasets as well as cause the need for real-time data analysis to obtain timely responses to potential threats in the network. Therefore, it is crucial for machine learning models to learn and improve their predictions or decisions in real time as new data become available. In this paper, we propose a new approach for attack detection in VANETs based on incremental online machine learning. This approach uses data collected from the monitoring of the VANET nodes’ behavior in real time and trains an online model using incremental online learning algorithms. More specifically, this research addresses the detection of black hole attacks that pose a significant threat to the Ad hoc On Demand Distance Vector (AODV) routing protocol. The data used for attack detection are gathered from simulating realistic VANET scenarios using the well-known simulators Simulation of Urban Mobility (SUMO) and Network Simulator (NS-3). Further, key features which are relevant in capturing the behavior of VANET nodes under black hole attack are monitored over time. The performance of two online incremental classifiers, Adaptive Random Forest (ARF) and K-Nearest Neighbors (KNN), are assessed in terms of Accuracy, Recall, Precision, and F1-score metrics, as well as training and testing time. The results show that ARF can be successfully applied to classify and detect black hole nodes in VANETs. ARF outperformed KNN in all performance measures but required more time to train and test compared to KNN. Our findings indicate that incremental online learning, which enables continuous and real-time learning, can be a potential method for identifying attacks in VANETs. Full article
Show Figures

Figure 1

36 pages, 2771 KiB  
Article
Security Framework for Network-Based Manufacturing Systems with Personalized Customization: An Industry 4.0 Approach
by Muhammad Hammad, Rashad Maqbool Jillani, Sami Ullah, Abdallah Namoun, Ali Tufail, Ki-Hyung Kim and Habib Shah
Sensors 2023, 23(17), 7555; https://doi.org/10.3390/s23177555 - 31 Aug 2023
Cited by 26 | Viewed by 4262
Abstract
Smart manufacturing is pivotal in the context of Industry 4.0, as it integrates advanced technologies like the Internet of Things (IoT) and automation to streamline production processes and improve product quality, paving the way for a competitive industrial landscape. Machines have become network-based [...] Read more.
Smart manufacturing is pivotal in the context of Industry 4.0, as it integrates advanced technologies like the Internet of Things (IoT) and automation to streamline production processes and improve product quality, paving the way for a competitive industrial landscape. Machines have become network-based through the IoT, where integrated and collaborated manufacturing system responds in real time to meet demand fluctuations for personalized customization. Within the network-based manufacturing system (NBMS), mobile industrial robots (MiRs) are vital in increasing operational efficiency, adaptability, and productivity. However, with the advent of IoT-enabled manufacturing systems, security has become a serious challenge because of the communication of various devices acting as mobile nodes. This paper proposes the framework for a newly personalized customization factory, considering all the advanced technologies and tools used throughout the production process. To encounter the security concern, an IoT-enabled NBMS is selected as the system model to tackle a black hole attack (BHA) using the NTRUEncrypt cryptography and the ad hoc on-demand distance-vector (AODV) routing protocol. NTRUEncrypt performs encryption and decryption while sending and receiving messages. The proposed technique is simulated by network simulator NS-2.35, and its performance is evaluated for different network environments, such as a healthy network, a malicious network, and an NTRUEncrypt-secured network based on different evaluation metrics, including throughput, goodput, end-to-end delay, and packet delivery ratio. The results show that the proposed scheme performs safely in the presence of a malicious node. The implications of this study are beneficial for manufacturing industries looking to embrace IoT-enabled subtractive and additive manufacturing facilitated by mobile industrial robots. Implementation of the proposed scheme ensures operational efficiency, enables personalized customization, and protects confidential data and communication in the manufacturing ecosystem. Full article
Show Figures

Figure 1

22 pages, 7295 KiB  
Article
Election of MPR Nodes and Detection of Malicious Nodes Based on a Byzantine Fault in the OLSR Protocol Case of a Scale-Free Network
by Noureddine Idboufker, Souhail Mssassi, Chahid Mohamed Alaoui and Hicham Zougagh
Electronics 2023, 12(16), 3390; https://doi.org/10.3390/electronics12163390 - 9 Aug 2023
Cited by 3 | Viewed by 1450
Abstract
V2X (Vehicle-to-Everything) communications play a crucial role in enabling the efficient and reliable exchange of information among vehicles, infrastructure, and other entities in smart transportation systems. However, the inherent vulnerabilities and dynamic nature of V2X networks present significant challenges for ensuring secure and [...] Read more.
V2X (Vehicle-to-Everything) communications play a crucial role in enabling the efficient and reliable exchange of information among vehicles, infrastructure, and other entities in smart transportation systems. However, the inherent vulnerabilities and dynamic nature of V2X networks present significant challenges for ensuring secure and trustworthy communication. By enhancing the security of the OLSR (Optimized Link State Routing) protocol through secure MultiPoint Relays (MPRs) Selection, this research aims to provide a robust approach that enhances the overall security posture of V2X networks, enabling safe and secure interactions between vehicles and their environment. The proposed method is based on the Byzantine general’s problem, which is the principle used in blockchain. Compared to the classical flooding mechanism, this technique greatly reduces network traffic overhead and improves the efficiency of bandwidth utilization. The results demonstrated that the proposed algorithm performed better than the well-used UM-OLSR implementation. The outcome proved that our MPR election algorithm guarantees a better packet delivery ratio, and it also performs very well in the detection and isolation of malicious nodes, leading to increased security of the OLSR protocol control plane. Full article
(This article belongs to the Special Issue Future Generation Wireless Communication)
Show Figures

Figure 1

20 pages, 1388 KiB  
Article
A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks
by Ruby Dass, Manikandan Narayanan, Gayathri Ananthakrishnan, Tamilarasi Kathirvel Murugan, Musiri Kailasanathan Nallakaruppan, Siva Rama Krishnan Somayaji, Kannan Arputharaj, Surbhi Bhatia Khan and Ahlam Almusharraf
Sensors 2023, 23(14), 6274; https://doi.org/10.3390/s23146274 - 10 Jul 2023
Cited by 30 | Viewed by 4048
Abstract
Recently, research into Wireless Body-Area Sensor Networks (WBASN) or Wireless Body-Area Networks (WBAN) has gained much importance in medical applications, and now plays a significant role in patient monitoring. Among the various operations, routing is still recognized as a resource-intensive activity. As a [...] Read more.
Recently, research into Wireless Body-Area Sensor Networks (WBASN) or Wireless Body-Area Networks (WBAN) has gained much importance in medical applications, and now plays a significant role in patient monitoring. Among the various operations, routing is still recognized as a resource-intensive activity. As a result, designing an energy-efficient routing system for WBAN is critical. The existing routing algorithms focus more on energy efficiency than security. However, security attacks will lead to more energy consumption, which will reduce overall network performance. To handle the issues of reliability, energy efficiency, and security in WBAN, a new cluster-based secure routing protocol called the Secure Optimal Path-Routing (SOPR) protocol has been proposed in this paper. This proposed algorithm provides security by identifying and avoiding black-hole attacks on one side, and by sending data packets in encrypted form on the other side to strengthen communication security in WBANs. The main advantages of implementing the proposed protocol include improved overall network performance by increasing the packet-delivery ratio and reducing attack-detection overheads, detection time, energy consumption, and delay. Full article
(This article belongs to the Special Issue Advanced Technologies in Sensor Networks and Internet of Things)
Show Figures

Figure 1

21 pages, 9537 KiB  
Article
FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs
by Sara Amaouche, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Sohaib Bin Altaf Khattak, Haleem Farman and Moustafa M. Nasralla
Appl. Sci. 2023, 13(13), 7488; https://doi.org/10.3390/app13137488 - 25 Jun 2023
Cited by 39 | Viewed by 2359
Abstract
Vehicular ad hoc networks (VANETs) are used for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. They are a special type of mobile ad hoc networks (MANETs) that can share useful information to improve road traffic and safety. In VANETs, vehicles [...] Read more.
Vehicular ad hoc networks (VANETs) are used for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. They are a special type of mobile ad hoc networks (MANETs) that can share useful information to improve road traffic and safety. In VANETs, vehicles are interconnected through a wireless medium, making the network susceptible to various attacks, such as Denial of Service (DoS), Distributed Denial of Service (DDoS), or even black hole attacks that exploit the wireless medium to disrupt the network. These attacks degrade the network performance of VANETs and prevent legitimate users from accessing resources. VANETs face unique challenges due to the fast mobility of vehicles and dynamic changes in network topology. The high-speed movement of vehicles results in frequent alterations in the network structure, posing difficulties in establishing and maintaining stable communication. Moreover, the dynamic nature of VANETs, with vehicles joining and leaving the network regularly, adds complexity to implementing effective security measures. These inherent constraints necessitate the development of robust and efficient solutions tailored to VANETs, ensuring secure and reliable communication in dynamic and rapidly evolving environments. Therefore, securing communication in VANETs is a crucial requirement. Traditional security countermeasures are not pertinent to autonomous vehicles. However, many machine learning (ML) technologies are being utilized to classify malicious packet information and a variety of solutions have been suggested to improve security in VANETs. In this paper, we propose an enhanced intrusion detection framework for VANETs that leverages mutual information to select the most relevant features for building an effective model and synthetic minority oversampling (SMOTE) to deal with the class imbalance problem. Random Forest (RF) is applied as our classifier, and the proposed method is compared with different ML techniques such as logistic regression (LR), K-Nearest Neighbor (KNN), decision tree (DT), and Support Vector Machine (SVM). The model is tested on three datasets, namely ToN-IoT, NSL-KDD, and CICIDS2017, addressing challenges such as missing values, unbalanced data, and categorical values. Our model demonstrated great performance in comparison to other models. It achieved high accuracy, precision, recall, and f1 score, with a 100% accuracy rate on the ToN-IoT dataset and 99.9% on both NSL-KDD and CICIDS2017 datasets. Furthermore, the ROC curve analysis demonstrated our model’s exceptional performance, achieving a 100% AUC score. Full article
(This article belongs to the Special Issue Data Security and Privacy in Mobile Cloud Computing)
Show Figures

Figure 1

22 pages, 3674 KiB  
Article
A UAV-Assisted Stackelberg Game Model for Securing loMT Healthcare Networks
by Jamshed Ali Shaikh, Chengliang Wang, Muhammad Asghar Khan, Syed Agha Hassnain Mohsan, Saif Ullah, Samia Allaoua Chelloug, Mohammed Saleh Ali Muthanna and Ammar Muthanna
Drones 2023, 7(7), 415; https://doi.org/10.3390/drones7070415 - 23 Jun 2023
Cited by 8 | Viewed by 2460
Abstract
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients’ health and provide reliable medical services, especially in remote and underserved areas. On the other hand, in disaster scenarios, the loss [...] Read more.
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients’ health and provide reliable medical services, especially in remote and underserved areas. On the other hand, in disaster scenarios, the loss of communication infrastructure can make it challenging to establish reliable communication and to provide timely first aid services. To address this challenge, unmanned aerial vehicles (UAVs) have been adopted to assist hospital centers in delivering medical care to hard-to-reach areas. Despite the potential of UAVs to improve medical services in emergency scenarios, their limited resources make their security critical. Therefore, developing secure and efficient communication protocols for IoMT networks using UAVs is a vital research area that can help ensure reliable and timely medical services. In this paper, we introduce a novel Stackelberg security-based game theory algorithm, named Stackelberg ad hoc on-demand distance vector (SBAODV), to detect and recover data affected by black hole attacks in IoMT networks using UAVs. Our proposed scheme utilizes the substantial Stackelberg equilibrium (SSE) to formulate strategies that protect the system against attacks. We evaluate the performance of our proposed SBAODV scheme and compare it with existing routing schemes. Our results demonstrate that our proposed scheme outperforms existing schemes regarding packet delivery ratio (PDR), networking load, throughput, detection ratio, and end-to-end delay. Specifically, our proposed SBAODV protocol achieves a PDR of 97%, throughput ranging from 77.7 kbps to 87.3 kbps, and up to 95% malicious detection rate at the highest number of nodes. Furthermore, our proposed SBADOV scheme offers significantly lower networking load (7% to 30%) and end-to-end delay (up to 30%) compared to existing routing schemes. These results demonstrate the efficiency and effectiveness of our proposed scheme in ensuring reliable and secure communication in IoMT emergency scenarios using UAVs. Full article
Show Figures

Figure 1

Back to TopTop