Abstract
With the growth in ad hoc devices, mobile ad hoc networks (MANETs) are extensively employed to realize different kinds of real-time applications. However, ad hoc devices suffer from numerous kinds of security attacks such as blackhole, grayhole, wormhole, etc. Therefore, an efficient trust management protocol is preferable. In this paper, a novel gradient boost classifier is proposed. Additionally, the hyper-parameters of gradient boost classifier are tuned using \(\theta \)-non-dominated sorting genetic algorithm-III (\(\theta \)NSGA-III). Optimized link state routing (OLSR) protocol is employed for experimental analysis. A multi-class dataset is collected by implementing the blackhole, grayhole, and wormhole attacks on the OLSR. Comparative analysis reveals that the proposed \(\theta \)NSGA-III-based gradient boost classifier outperforms the competitive attack classification models.
Similar content being viewed by others
References
Bhawsar A, Pandey Y and Singh U 2020 Detection and prevention of wormhole attack using the trust-based routing system. In: 2020 Proceedings of the International Conference on Electronics and Sustainable Communication Systems (ICESC), July, pp. 809–814
Rupasinghe L, Nawarathna C, Niroshan M A J, Kodithuwakku K A H, Kularathna M A S H and Liyanage S C G 2018 Trustworthy MANET routing ESTAODV implementation. In: Proceedings of the 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), December, pp. 1–6
Wang B, Ding L, Yang F, Qian L, Liu N 2019 Trust based partially distributed key management scheme for aeronautical ad hoc networks. In: Proceedings of the 2019 25th Asia–Pacific Conference on Communications (APCC), November, pp. 449–454
Karthick S, Sankar S P and Teen Y P A 2018 Trust–distrust protocol for secure routing in self-organizing networks. In: Proceedings of the 2018 International Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR), July, pp. 1–8
Wang X, Zhang P, Du Y and Qi M 2020 Trust routing protocol based on cloud-based fuzzy petri net and trust entropy for mobile ad hoc network. IEEE Access 8: 47675–47693
Subhankar Ghosh, Palaiahnakote Shivakumara, Prasun Roy, Umapada Pal and Tong Lu 2020 Graphology based handwritten character analysis for human behaviour identification. CAAI Trans. Intell. Technol. 5(1): 55–65
Dhanya K, Jeyalakshmi C and Balakumar A 2019 A secure autonomic mobile ad-hoc network based trusted routing proposal. In: Proceedings of the 2019 International Conference on Computer Communication and Informatics (ICCCI), January, pp. 1–6
Hema Shekar Basavegowda and Guesh Dagnew 2020 Deep learning approach for microarray cancer data classification. CAAI Trans. Intell. Technol. 5(1): 22–33
Travis Wiens 2019 Engine speed reduction for hydraulic machinery using predictive algorithms. Int. J. Hydromechatron. 2(1): 16–31
Manjit Kaur, Dilbag Singh, Kehui Sun and Umashankar Rawat 2020 Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Future Gen. Comput. Syst. 107: 333–350
Naveena S, Senthilkumar C and Manikandan T 2020 Analysis and countermeasures of black-hole attack in MANET by employing trust-based routing. In: Proceedings of the 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), March, pp. 1222–1227
Bhupendra Gupta, Mayank Tiwari and Subir Singh Lamba 2019 Visibility improvement and mass segmentation of mammogram images using quantile separated histogram equalisation with local contrast enhancement. CAAI Trans. Intell. Technol. 4(2): 73–79
Zalte S S and Ghorpade V R 2018 Intrusion detection system for MANET. In: Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), April, pp. 1–4
Sven Osterland and Jürgen Weber 2019 Analytical analysis of single-stage pressure relief valves. Int. J. Hydromechatron. 2(1): 32–53
Renzong Wang, Hechun Yu, Guangzhou Wang, Guoqing Zhang, and Wenbo Wang 2019 Study on the dynamic and static characteristics of gas static thrust bearing with micro-hole restrictors. Int. J. Hydromechatron. 2(3): 189–202
Biswas A K and Dasgupta M 2020 Modification of DSDV and secure routing using blockchain technology. In: Proceedings of the 2020 4th International Conference on Electronics, Materials Engineering and Nano-Technology (IEMENTech), October, pp. 1–5
Kong R and Tong X 2020 Dynamic weighted heuristic trust path search algorithm. IEEE Access 8: 157382–157390
Guo K, Wang D, Zhi H, Lu Y and Jiao Z 2020 A trusted resource-based routing algorithm with entropy estimation in integrated space–terrestrial network. IEEE Access 8: 122456–122468
Hui Xia, Zhiping Jia, Xin Li, Lei Ju and Edwin H M Sha 2013 Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7): 2096–2114
Shuaishuai Tan, Xiaoping Li and Qingkuan Dong 2015 Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30: 84–98
Wei Gong, Zhiyang You, Danning Chen, Xibin Zhao, Ming Gu and Kwok-Yan Lam 2010 Trust based routing for misbehavior detection in ad hoc networks. J. Netw. 5(5): 551
Muthumanickam Gunasekaran and Kandhasamy Premalatha 2013 TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. IET Inf. Secur. 7(3): 203–211
Hui Xia, Zhiping Jia, Lei Ju and Youqin Zhu 2011 Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 1(4): 248–266
Antesar M Shabut, Keshav P Dahal, Sanat Kumar Bista and Irfan U Awan 2014 Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans. Mobile Comput. 14(10): 2101–2115
Mohanapriya Marimuthu and Ilango Krishnamurthi 2013 Enhanced OLSR for defense against DOS attack in ad hoc networks. Journal of Communications and Networks 15(1): 31–37
Revathi Venkataraman, Mullur Pushpalatha and T Rama Rao 2012 Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3): 131–140
Xin Li, Zhiping Jia, Peng Zhang, Ruihua Zhang and Haiyang Wang 2010 Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4(4): 212–232
Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek and Imed Romdhani 2020 Trust-aware and cooperative routing protocol for IOT security. J. Inf. Secur. Appl. 52: 102467
Nilesh Marathe and Subhash K Shinde 2019 ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on manet routing. Wirel. Person. Commun. 107(1): 393–416
Hang Zhang, Xi Wang, Parisa Memarmoshrefi and Dieter Hogrefe 2017 A survey of ant colony optimization based routing protocols for mobile ad hoc networks. IEEE Access 5: 24139–24161
Hui Cheng and Shengxiang Yang 2010 Genetic algorithms with immigrants schemes for dynamic multicast problems in mobile ad hoc networks. Eng. Appl. Artif. Intell. 23(5): 806–819
Shengxiang Yang, Hui Cheng and Fang Wang 2009 Genetic algorithms with immigrants and memory schemes for dynamic shortest path routing problems in mobile ad hoc networks. IEEE Tran. Syst. Man Cybern. Part C Appl. Rev. 40(1): 52–63
Surendran S and Prakash S 2015 An ACO look-ahead approach to QOS enabled fault-tolerant routing in MANETs. China Commun. 12(8): 93–110
Bhaskar Nandi, Subhabrata Barman and Soumen Paul 2010 Genetic algorithm based optimization of clustering in ad hoc networks. arXiv preprint arXiv:1002.2194
Hamid Ali, Waseem Shahzad and Farrukh Aslam Khan 2012 Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl. Soft Comput. 12(7): 1913–1928
Madasamy Kaliappan, Susan Augustine and Balasubramanian Paramasivan 2016 Enhancing energy efficiency and load balancing in mobile ad hoc network using dynamic genetic algorithms. J. Netw. Comput. Appl. 73: 35–43
Lara Lusa et al 2017 Gradient boosting for high-dimensional prediction of rare events. Comput. Stat. Data Anal. 113: 19–37
Adeola Azeez Ogunleye and Wang Qing-Guo 2019 Xgboost model for chronic kidney disease diagnosis. IEEE/ACM Trans. Comput. Biol. Bioinform. 17(6): 2131–2140
Manjit Kaur, Dilbag Singh and Raminder Singh Uppal 2019 Parallel strength Pareto evolutionary algorithm-ii based image encryption. IET Image Process. 14(6): 1015–1026
Daniel Chao Zhou, Zhongming Jin and Tong Zhang 2019 A fast sampling gradient tree boosting framework. arXiv e-prints arXiv:1911.08820
Yuan Yuan, Hua Xu, Bo Wang and Xin Yao 2015 A new dominance relation-based evolutionary algorithm for many-objective optimization. IEEE Trans. Evolut. Comput. 20(1): 16–37
Manjit Kaur, Dilbag Singh, Vijay Kumar and Kehui Sun 2020 Color image dehazing using gradient channel prior and guided l0 filter. Inf. Sci. 521: 326–342
Anvita Gupta, Dilbag Singh and Manjit Kaur 2020 An efficient image encryption using non-dominated sorting genetic algorithm-iii based 4-D chaotic maps. J. Ambient Intell. Hum. Comput. 11(3): 1309–1324
Manjit Kaur, Dilbag Singh and Vijay Kumar 2020 Color image encryption using minimax differential evolution-based 7D hyper-chaotic map. Appl. Phys. B 126(9): 1–19
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kaur, J., Kaur, S. Secure communication using \(\theta \)-non-dominated sorting genetic algorithm. Sādhanā 46, 42 (2021). https://doi.org/10.1007/s12046-021-01573-9
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12046-021-01573-9