DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output

被引:3
作者
Pramitarini, Yushintia [1 ]
Perdana, Ridho Hendra Yoga [1 ]
Shim, Kyusung [2 ]
An, Beongku [3 ]
机构
[1] Hongik Univ, Grad Sch, Dept Software & Commun Engn, Sejong 30016, South Korea
[2] Hankyong Natl Univ, Sch Comp Engn & Appl Math, Anseong 17579, South Korea
[3] Hongik Univ, Dept Software & Commun Engn, Sejong 30016, South Korea
基金
新加坡国家研究基金会;
关键词
CF-mMIMO; clustering; deep learning; flying ad hoc networks; secure multicast routing; security; wormhole attack; ALGORITHM;
D O I
10.3390/s23187960
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The network area is extended from ground to air. In order to efficiently manage various kinds of nodes, new network paradigms are needed such as cell-free massive multiple-input multiple-output (CF-mMIMO). Additionally, security is also considered as one of the important quality-of-services (QoS) parameters in future networks. Thus, in this paper, we propose a novel deep learning-based secure multicast routing protocol (DLSMR) in flying ad hoc networks (FANETs) with cell-free massive MIMO (CF-mMIMO). We consider the problem of wormhole attacks in the multicast routing process. To tackle this problem, we propose the DLSMR protocol, which utilizes a deep learning (DL) approach to predict the secure and unsecured route based on node ID, distance, destination sequence, hop count, and energy to avoid wormhole attacks. This work also addresses key concerns in FANETs such as security, scalability, and stability. The main contributions of this paper are as follows: (1) We propose a deep learning-based secure multicast routing protocol (DLSMR) to establish a high-stability multicast tree and improve security performance against wormhole attacks. In more detail, the DLSMR protocol predicts whether the route is secure based on network information such as node ID, distance, destination sequence, hop count, and remaining energy or not. (2) To improve the node connectivity and manage multicast members, we propose a top-down particle swarm optimization-based clustering (TD-PSO) protocol to maximize the cost function considering node degree, cosine similarity, cosine distance, and cluster head energy to guarantee convergence to the global optima. Thus, the TD-PSO protocol provides more strong connectivity. (3) Performance evaluations verify the proposed routing protocol establishes a secure route by avoiding wormhole attacks as well as by providing strong connectivity. The TD-PSO clustering supports connectivity to enhance network performance. In addition, we exploit the impact of the mobility model on the network metrics such as packet delivery ratio, routing delay, control overhead, packet loss ratio, and number of packet losses.
引用
收藏
页数:28
相关论文
共 42 条
  • [1] Using Residual Networks and Cosine Distance-Based K-NN Algorithm to Recognize On-Line Signatures
    Abosamra, Gibrael
    Oqaibi, Hadi
    [J]. IEEE ACCESS, 2021, 9 : 54962 - 54977
  • [2] Secure Ground Control Station-based Routing Protocol for UAV Networks
    Agron, Danielle Jaye Segui
    Ramli, Muhammad Rusyadi
    Lee, Jae-Min
    Kim, Dong-Seong
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 794 - 798
  • [3] Al-Emadi S., 2020, P 2020 3 INT C ADV C, P1
  • [4] Bio-Inspired Approaches for Energy-Efficient Localization and Clustering in UAV Networks for Monitoring Wildfires in Remote Areas
    Arafat, Muhammad Yeasir
    Moh, Sangman
    [J]. IEEE ACCESS, 2021, 9 : 18649 - 18669
  • [5] Localization and Clustering Based on Swarm Intelligence in UAV Networks for Emergency Communications
    Arafat, Muhammad Yeasir
    Moh, Sangman
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8958 - 8976
  • [6] Ashour O, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P1145, DOI 10.1109/UEMCON47517.2019.8993014
  • [7] Bhatia Tarandeep Kaur, 2022, 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), P438, DOI 10.1109/SMART55829.2022.10047757
  • [8] Wormhole Attack Detection System for IoT Network: A Hybrid Approach
    Bhosale, Snehal A.
    Sonavane, S. S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1081 - 1108
  • [9] Cheriguene Y., 2020, P 2020 IEEE ACM 24 I, P1
  • [10] Towards Persistent Surveillance and Reconnaissance Using a Connected Swarm of Multiple UAVs
    Cho, Jeihee
    Sung, Jaeyi
    Yoon, Jinyi
    Lee, Hyungjune
    [J]. IEEE ACCESS, 2020, 8 (08): : 157906 - 157917