Deep Learning Models for Intrusion Detection Systems in MANETs: A Comparative Analysis

Authors

DOI:

https://doi.org/10.31181/dma31202556

Keywords:

Intermediate nodes, Deep learning, Multipath routing data, Networks

Abstract

MANETs are dynamic, collaborative networks that maintain reliable connections in a self-organized manner. The intermediate nodes aim to forward the data packets between the source and destination nodes. However, most nodes are prone to attack, where intruders tend to attack these nodes and invade the data. With such consideration, the multipath routing in MANETs requires a serious intrusion detection system to detect the attacks in the network. In this paper, we develop a deep learning algorithm named graph neural network (GNN) to detect the possible intrusions of attacks in the nodes. GNN is trained with the possible datasets, and that is tested onto the network. The simulation shows a better resilience to the network against attacks than the other methods.

Downloads

Download data is not yet available.

References

Majid, M., Habib, S., Javed, A. R., Rizwan, M., Srivastava, G., Gadekallu, T. R., & Lin, J. C. W. (2022). Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review. Sensors, 22(6), 2087. https://doi.org/10.3390/s22062087.

Quy, V. K., Nam, V. H., Linh, D. M., Ban, N. T., & Han, N. D. (2021). A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wireless Personal Communications, 120(1), 49-62. https://doi.org/10.1007/s11277-021-08433-z.

Ercan, S., Ayaida, M., & Messai, N. (2021). Misbehavior detection for position falsification attacks in VANETs using machine learning. IEEE Access, 10, 1893-1904. https://doi.org/10.1109/ACCESS.2021.3136706.

Sivaram, M., Yuvaraj, D., Mohammed, A. S., Manikandan, V., Porkodi, V., & Yuvaraj, N. (2019). Improved enhanced DBTMA with contention-aware admission control to improve the network performance in MANETS. CMC-Computers Materials & Continua, 60(2), 435-454. https://doi.org/10.32604/cmc.2019.06295.

ALRikabi, H. T., & Hazim, H. T. (2022). Secure Chaos of 5G Wireless Communication System Based on IOT Applications. International Journal of Online & Biomedical Engineering, 18(12), 89-105. https://doi.org/10.3991/ijoe.v18i12.33817.

Tadic, B., Rohde, M., Randall, D., & Wulf, V. (2023). Design Evolution of a Tool for Privacy and Security Protection for Activists Online: Cyberactivist. International Journal of Human–Computer Interaction, 39(1), 249-271. https://doi.org/10.1080/10447318.2022.2041894.

Amponis, G., Lagkas, T., Zevgara, M., Katsikas, G., Xirofotos, T., Moscholios, I., &Sarigiannidis, P. (2022). Drones in B5G/6G networks as flying base stations. Drones, 6(2), 39. https://doi.org/10.3390/drones6020039.

Hajiee, M., Fartash, M., & OsatiEraghi, N. (2021). An energy-aware trust and opportunity based routing algorithm in wireless sensor networks using multipath routes technique. Neural Processing Letters, 53(4), 2829-2852. https://doi.org/10.1007/s11063-021-10525-7.

Yue, K., Zhang, Y., Chen, Y., Li, Y., Zhao, L., Rong, C., & Chen, L. (2021). A survey of decentralizing applications via blockchain: The 5G and beyond perspective. IEEE Communications Surveys & Tutorials, 23(4), 2191-2217. https://doi.org/10.1109/COMST.2021.3115797.

Khraisat, A., & Alazab, A. (2021). A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4, 1-27. https://doi.org/10.1186/s42400-021-00077-7.

Tilwari, V., Maheswar, R., Jayarajan, P., Sundararajan, T. V. P., Hindia, M. N., Dimyati, K., et al. (2020). MCLMR: A multicriteria based multipath routing in the mobile ad hoc networks. Wireless Personal Communications, 112, 2461-2483. https://doi.org/10.1007/s11277-020-07159-8.

Thirumalairaj, A., & Jeyakarthic, M. (2020). Hybrid Cuckoo Search Optimization based Tuning Scheme for Deep Neural Network for Intrusion Detection Systems in Cloud Environment. Journal of Research on the Lepidoptera, 51(2), 209-224. https://doi.org/10.36872/LEPI/V51I2/301089.

Rao, P. V., Murthy, K. S., Krishnan, V. G., Divya, V., & Sathyamoorthy, K. (2022). Detection Of Sybil Attack In MANET Environment Using ANFIS With Bloom Filter Algorithm. Indian Journal of Computer Science and Engineering (IJCSE), 13(1), 82-92. https://doi.org/10.21817/indjcse/2022/v13i1/221301058.

Ye, Z., Sun, Y., Sun, S., Zhan, S., Yu, H., & Yao, Q. (2019). Research on network intrusion detection based on support vector machine optimized with grasshopper optimization algorithm. In 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 378-383, IEEE. https://doi.org/10.1109/IDAACS.2019.8924234.

Hu, Y. C., Perrig, A., & Johnson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th annual international conference on Mobile computing and networking, pp. 12-23. https://doi.org/10.1145/570645.570648.

Xu, G., Borcea, C., & Iftode, L. (2010). A policy enforcing mechanism for trusted ad hoc networks. IEEE Transactions on Dependable and Secure Computing, 8(3), 321-336. https://doi.org/10.1109/TDSC.2010.11.

Sadeghi, M., & Yahya, S. (2012). Analysis of Wormhole attack on MANETs using different MANET routing protocols. In 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 301-305, IEEE. https://doi.org/10.1109/ICUFN.2012.6261716.

Prakash, S., & Swaroop, A. (2016, April). A brief survey of blackhole detection and avoidance for ZRP protocol in MANETs. In 2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 651-654). IEEE.

Qian, C., Zhang, Y., & Ren, S. (2019). Evolution of a self-organizing manufacturing network with homophily and heterophily. Procedia CIRP, 83, 800-804. https://doi.org/10.1016/j.procir.2019.04.333.

Abu-El-Haija, S., Perozzi, B., Kapoor, A., Alipourfard, N., Lerman, K., Harutyunyan, H., et al. (2019). Mixhop: Higher-order graph convolutional architectures via sparsified neighborhood mixing. In International Conference on Machine Learning, pp. 21-29, PMLR.

Yan, Z., Li, H., Nakazato, H., Park, Y. J., & Lee, J. H. (2019). DNS based Neighbor Discovery in ITS. In 2019 IEEE International Conference on Consumer Electronics (ICCE), IEEE. https://doi.org/10.1109/ICCE.2019.8662016.

Al‐Baz, A., & El‐Sayed, A. (2018). A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. International Journal of Communication Systems, 31(1), e3407. https://doi.org/10.1002/dac.3407.

Draz, U., Ali, T., Yasin, S., & Shaf, A. (2018). Evaluation based analysis of packet delivery ratio for AODV and DSR under UDP and TCP environment. In 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp. 1-7, IEEE. https://doi.org/10.1109/ICOMET.2018.8346385.

Gupta, S. K., Alsamhi, S. H., & Saket, R. K. (2016). Comparative performance analysis of AODV for CBR & VBR traffic under influence of ART & DPC. In 2016 11th International Conference on Industrial and Information Systems (ICIIS), pp. 112-117, IEEE. https://doi.org/10.1109/ICIINFS.2016.8262917.

Zarzoor, A. R. (2021). Enhancing dynamic source routing (DSR) protocol performance based on link quality metrics. In 2021 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 17-21, IEEE. https://doi.org/10.1109/iSemantic52711.2021.9573233.

Jhajj, H., Datla, R., & Wang, N. (2019). Design and implementation of an efficient multipath AODV routing algorithm for MANETs. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 527-531, IEEE. https://doi.org/10.1109/CCWC.2019.8666607.

Fengjie, Y., Hui, Y., & Ying, Z. (2018). Research on DSDV routing protocol based on wireless Mesh network. In 2018 Chinese Control and Decision Conference (CCDC), pp. 4292-4297, IEEE. https://doi.org/10.1109/CCDC.2018.8407870.

Casares-Giner, V., Inés Navas, T., Smith Flórez, D., & Vargas Hernández, T. R. (2019). End to end delay and energy consumption in a two tier cluster hierarchical wireless sensor networks. Information, 10(4), 135. https://doi.org/10.3390/info10040135.

Volkov, A. S., Muratchaev, S. S., & Kulpina, Y. A. (2019). Developing simulation model of two-rank MANET Network. TRUDI MAI, 109, 13 https://doi.org/10.34759/trd-2019-109-13.

Ali, M., Parwanti, A., & Firdaus, A. A. (2020). Optimization of water level control systems using anfis and fuzzy-pid model. In 2020 Third International Conference on Vocational Education and Electrical Engineering (ICVEE), IEEE. https://doi.org/10.1109/ICVEE50212.2020.9243229.

Published

2025-01-01

How to Cite

Saravanan, S., Dar, S. A., Rather, A. A., Qayoom, D., & Ali, I. (2025). Deep Learning Models for Intrusion Detection Systems in MANETs: A Comparative Analysis. Decision Making Advances, 3(1), 96–110. https://doi.org/10.31181/dma31202556