Skip to main content

Advertisement

Log in

Secure communication using \(\theta \)-non-dominated sorting genetic algorithm

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

With the growth in ad hoc devices, mobile ad hoc networks (MANETs) are extensively employed to realize different kinds of real-time applications. However, ad hoc devices suffer from numerous kinds of security attacks such as blackhole, grayhole, wormhole, etc. Therefore, an efficient trust management protocol is preferable. In this paper, a novel gradient boost classifier is proposed. Additionally, the hyper-parameters of gradient boost classifier are tuned using \(\theta \)-non-dominated sorting genetic algorithm-III (\(\theta \)NSGA-III). Optimized link state routing (OLSR) protocol is employed for experimental analysis. A multi-class dataset is collected by implementing the blackhole, grayhole, and wormhole attacks on the OLSR. Comparative analysis reveals that the proposed \(\theta \)NSGA-III-based gradient boost classifier outperforms the competitive attack classification models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4

Similar content being viewed by others

References

  1. Bhawsar A, Pandey Y and Singh U 2020 Detection and prevention of wormhole attack using the trust-based routing system. In: 2020 Proceedings of the International Conference on Electronics and Sustainable Communication Systems (ICESC), July, pp. 809–814

  2. Rupasinghe L, Nawarathna C, Niroshan M A J, Kodithuwakku K A H, Kularathna M A S H and Liyanage S C G 2018 Trustworthy MANET routing ESTAODV implementation. In: Proceedings of the 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), December, pp. 1–6

  3. Wang B, Ding L, Yang F, Qian L, Liu N 2019 Trust based partially distributed key management scheme for aeronautical ad hoc networks. In: Proceedings of the 2019 25th Asia–Pacific Conference on Communications (APCC), November, pp. 449–454

  4. Karthick S, Sankar S P and Teen Y P A 2018 Trust–distrust protocol for secure routing in self-organizing networks. In: Proceedings of the 2018 International Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR), July, pp. 1–8

  5. Wang X, Zhang P, Du Y and Qi M 2020 Trust routing protocol based on cloud-based fuzzy petri net and trust entropy for mobile ad hoc network. IEEE Access 8: 47675–47693

    Article  Google Scholar 

  6. Subhankar Ghosh, Palaiahnakote Shivakumara, Prasun Roy, Umapada Pal and Tong Lu 2020 Graphology based handwritten character analysis for human behaviour identification. CAAI Trans. Intell. Technol. 5(1): 55–65

    Article  Google Scholar 

  7. Dhanya K, Jeyalakshmi C and Balakumar A 2019 A secure autonomic mobile ad-hoc network based trusted routing proposal. In: Proceedings of the 2019 International Conference on Computer Communication and Informatics (ICCCI), January, pp. 1–6

  8. Hema Shekar Basavegowda and Guesh Dagnew 2020 Deep learning approach for microarray cancer data classification. CAAI Trans. Intell. Technol. 5(1): 22–33

    Article  Google Scholar 

  9. Travis Wiens 2019 Engine speed reduction for hydraulic machinery using predictive algorithms. Int. J. Hydromechatron. 2(1): 16–31

    Article  Google Scholar 

  10. Manjit Kaur, Dilbag Singh, Kehui Sun and Umashankar Rawat 2020 Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Future Gen. Comput. Syst. 107: 333–350

    Article  Google Scholar 

  11. Naveena S, Senthilkumar C and Manikandan T 2020 Analysis and countermeasures of black-hole attack in MANET by employing trust-based routing. In: Proceedings of the 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), March, pp. 1222–1227

  12. Bhupendra Gupta, Mayank Tiwari and Subir Singh Lamba 2019 Visibility improvement and mass segmentation of mammogram images using quantile separated histogram equalisation with local contrast enhancement. CAAI Trans. Intell. Technol. 4(2): 73–79

    Article  Google Scholar 

  13. Zalte S S and Ghorpade V R 2018 Intrusion detection system for MANET. In: Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), April, pp. 1–4

  14. Sven Osterland and Jürgen Weber 2019 Analytical analysis of single-stage pressure relief valves. Int. J. Hydromechatron. 2(1): 32–53

    Article  Google Scholar 

  15. Renzong Wang, Hechun Yu, Guangzhou Wang, Guoqing Zhang, and Wenbo Wang 2019 Study on the dynamic and static characteristics of gas static thrust bearing with micro-hole restrictors. Int. J. Hydromechatron. 2(3): 189–202

    Article  Google Scholar 

  16. Biswas A K and Dasgupta M 2020 Modification of DSDV and secure routing using blockchain technology. In: Proceedings of the 2020 4th International Conference on Electronics, Materials Engineering and Nano-Technology (IEMENTech), October, pp. 1–5

  17. Kong R and Tong X 2020 Dynamic weighted heuristic trust path search algorithm. IEEE Access 8: 157382–157390

    Article  Google Scholar 

  18. Guo K, Wang D, Zhi H, Lu Y and Jiao Z 2020 A trusted resource-based routing algorithm with entropy estimation in integrated space–terrestrial network. IEEE Access 8: 122456–122468

    Article  Google Scholar 

  19. Hui Xia, Zhiping Jia, Xin Li, Lei Ju and Edwin H M Sha 2013 Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7): 2096–2114

    Article  Google Scholar 

  20. Shuaishuai Tan, Xiaoping Li and Qingkuan Dong 2015 Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30: 84–98

    Article  Google Scholar 

  21. Wei Gong, Zhiyang You, Danning Chen, Xibin Zhao, Ming Gu and Kwok-Yan Lam 2010 Trust based routing for misbehavior detection in ad hoc networks. J. Netw. 5(5): 551

    Google Scholar 

  22. Muthumanickam Gunasekaran and Kandhasamy Premalatha 2013 TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. IET Inf. Secur. 7(3): 203–211

    Article  Google Scholar 

  23. Hui Xia, Zhiping Jia, Lei Ju and Youqin Zhu 2011 Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 1(4): 248–266

    Article  Google Scholar 

  24. Antesar M Shabut, Keshav P Dahal, Sanat Kumar Bista and Irfan U Awan 2014 Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans. Mobile Comput. 14(10): 2101–2115

    Article  Google Scholar 

  25. Mohanapriya Marimuthu and Ilango Krishnamurthi 2013 Enhanced OLSR for defense against DOS attack in ad hoc networks. Journal of Communications and Networks 15(1): 31–37

    Article  Google Scholar 

  26. Revathi Venkataraman, Mullur Pushpalatha and T Rama Rao 2012 Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3): 131–140

    Article  Google Scholar 

  27. Xin Li, Zhiping Jia, Peng Zhang, Ruihua Zhang and Haiyang Wang 2010 Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4(4): 212–232

    Article  Google Scholar 

  28. Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek and Imed Romdhani 2020 Trust-aware and cooperative routing protocol for IOT security. J. Inf. Secur. Appl. 52: 102467

    Google Scholar 

  29. Nilesh Marathe and Subhash K Shinde 2019 ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on manet routing. Wirel. Person. Commun. 107(1): 393–416

    Article  Google Scholar 

  30. Hang Zhang, Xi Wang, Parisa Memarmoshrefi and Dieter Hogrefe 2017 A survey of ant colony optimization based routing protocols for mobile ad hoc networks. IEEE Access 5: 24139–24161

    Article  Google Scholar 

  31. Hui Cheng and Shengxiang Yang 2010 Genetic algorithms with immigrants schemes for dynamic multicast problems in mobile ad hoc networks. Eng. Appl. Artif. Intell. 23(5): 806–819

    Article  MathSciNet  Google Scholar 

  32. Shengxiang Yang, Hui Cheng and Fang Wang 2009 Genetic algorithms with immigrants and memory schemes for dynamic shortest path routing problems in mobile ad hoc networks. IEEE Tran. Syst. Man Cybern. Part C Appl. Rev. 40(1): 52–63

    Article  Google Scholar 

  33. Surendran S and Prakash S 2015 An ACO look-ahead approach to QOS enabled fault-tolerant routing in MANETs. China Commun. 12(8): 93–110

    Article  Google Scholar 

  34. Bhaskar Nandi, Subhabrata Barman and Soumen Paul 2010 Genetic algorithm based optimization of clustering in ad hoc networks. arXiv preprint arXiv:1002.2194

  35. Hamid Ali, Waseem Shahzad and Farrukh Aslam Khan 2012 Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl. Soft Comput. 12(7): 1913–1928

    Article  Google Scholar 

  36. Madasamy Kaliappan, Susan Augustine and Balasubramanian Paramasivan 2016 Enhancing energy efficiency and load balancing in mobile ad hoc network using dynamic genetic algorithms. J. Netw. Comput. Appl. 73: 35–43

    Article  Google Scholar 

  37. Lara Lusa et al 2017 Gradient boosting for high-dimensional prediction of rare events. Comput. Stat. Data Anal. 113: 19–37

    Article  MathSciNet  Google Scholar 

  38. Adeola Azeez Ogunleye and Wang Qing-Guo 2019 Xgboost model for chronic kidney disease diagnosis. IEEE/ACM Trans. Comput. Biol. Bioinform. 17(6): 2131–2140

    Article  Google Scholar 

  39. Manjit Kaur, Dilbag Singh and Raminder Singh Uppal 2019 Parallel strength Pareto evolutionary algorithm-ii based image encryption. IET Image Process. 14(6): 1015–1026

    Article  Google Scholar 

  40. Daniel Chao Zhou, Zhongming Jin and Tong Zhang 2019 A fast sampling gradient tree boosting framework. arXiv e-prints arXiv:1911.08820

  41. Yuan Yuan, Hua Xu, Bo Wang and Xin Yao 2015 A new dominance relation-based evolutionary algorithm for many-objective optimization. IEEE Trans. Evolut. Comput. 20(1): 16–37

    Article  Google Scholar 

  42. Manjit Kaur, Dilbag Singh, Vijay Kumar and Kehui Sun 2020 Color image dehazing using gradient channel prior and guided l0 filter. Inf. Sci. 521: 326–342

    Article  Google Scholar 

  43. Anvita Gupta, Dilbag Singh and Manjit Kaur 2020 An efficient image encryption using non-dominated sorting genetic algorithm-iii based 4-D chaotic maps. J. Ambient Intell. Hum. Comput. 11(3): 1309–1324

    Article  Google Scholar 

  44. Manjit Kaur, Dilbag Singh and Vijay Kumar 2020 Color image encryption using minimax differential evolution-based 7D hyper-chaotic map. Appl. Phys. B 126(9): 1–19

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jasleen Kaur.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, J., Kaur, S. Secure communication using \(\theta \)-non-dominated sorting genetic algorithm. Sādhanā 46, 42 (2021). https://doi.org/10.1007/s12046-021-01573-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12046-021-01573-9

Keywords

Navigation