AI-enhanced security demand and routing management for MANETs with optical technologies

被引:2
作者
Jia, Xuetao [1 ]
Huang, Donggui [1 ]
Qin, Na [2 ]
机构
[1] Liuzhou Railway Vocat Tech Coll, Commun & Internet Things, Liuzhou 545616, Guangxi, Peoples R China
[2] Southwest Jiaotong Univ, Elect Engn, Chengdu 611756, Sichuan, Peoples R China
关键词
Security management; Routing management; Mamdani routing system; Stacked reinforcement learning; Honey pot analysis; Optical technology;
D O I
10.1007/s11082-023-05792-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The proliferation of Mobile Ad hoc Networks (MANETs), where nodes connect with one another to offer the required real-time entertainment services, is where academics are focusing more attention as a result of recent breakthroughs in wireless communication. Decentralised design and wireless connection of MANETs, however, make building safe routing a difficult problem. Artificial Intelligence (AI) and optical technologies have attracted a lot of attention as a way to address these security issues and improve network performance. This study uses a machine learning model to provide a unique security management and routing management method for MANETs. Here, trust-based multi-tier honey pot analysis with stacked reinforcement learning (MHSRL) is used to monitor the security of the network. The linear gradient Distance Vector dynamic Mamdani routing system (LGDVDMR) is used to regulate network routing. For different security-based datasets, experimental analysis is done in terms of throughput, end-end latency, packet delivery ratio, and trust analysis. Generated graph executes both the performance graph and the packet drop. The results of research studies indicate that our method locates the closest node that is the safest and finds problematic nodes with a tolerable load. Proposed technique attained throughput 96%, trust analysis 98%, end-end delay of 59%, packet delivery ratio of 79%.
引用
收藏
页数:17
相关论文
共 19 条
  • [11] Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches
    Mughaid, Ala
    AlZu'bi, Shadi
    Alnajjar, Asma
    AbuElsoud, Esraa
    El Salhi, Subhieh
    Igried, Bashar
    Abualigah, Laith
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (09) : 13973 - 13995
  • [12] Saravanan M., 2022, INT C HYBR INT SYST, P929
  • [13] Sattaru Naveen Chakravarthy, 2022, 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), P821, DOI 10.1109/ICACITE53722.2022.9823760
  • [14] Sbai O., 2022, Int J Artif Intell, V2252, P8938
  • [15] Sengan Sudhakar, 2022, International Journal of Reliable and Quality E-Healthcare, V11, P1, DOI [10.4018/IJRQEH.289176, 10.4018/IJRQEH.289175]
  • [16] Shafi Shaik, 2023, Procedia Computer Science, P2309, DOI 10.1016/j.procs.2023.01.206
  • [17] Sivanesan N., 2022, Int. J. Adv. Com. Sci. Appl., V13, DOI [10.14569/IJACSA.2022.0131262, DOI 10.14569/IJACSA.2022.0131262]
  • [18] Sultanuddin S. J, 2022, Int. J, V3, P1
  • [19] Yeruva A.R., 2023, CYBERNET SYST, DOI DOI 10.1080/01969722.2023.2166241