SELECTIVE FORWARDING ATTACKS DETECTION IN WIRELESS SENSOR NETWORKS USING BLUE MONKEY OPTIMIZED GHOST NETWORK

Abstract

Wireless Sensor Networks (WSNs) are increasingly the technology of choice due to their wide applicability in both military and civilian domains. The selective forwarding attack, one of the main attacks in WSNs, is the hardest denial-of- service attack to detect. The hostile nodes that initiate the selective forwarding attack will discard some or all of the data packets they receive. Numerous detection techniques for optional forwarding have been developed attacks are inaccurate or contain sophisticated algorithms, which is especially true when the attacker also uses other attacks like distributed denial of service, wormholes, and black holes to move through the network. To address these disadvantages, this research proposes a novel selective forwarding attack detection method based blue monkey-optimized ghost net (SAD-Ghost) method. To identify network threats, Blue Monkey optimization based on the hazard model is built in this case. A proposed technique to improve detection accuracy and minimize computation. The primary goal of the research is to develop a Selective Forwarding Attack Detection utilizing a blue Monkey optimized Ghost net to improve network lifetime. Initially, Blue Monkey optimization is used for optimal cluster head selection based on node degree and density. Moreover, cluster data are pre-processed using Tokenization, Normalization, and Reduction. The proposed method is utilized to detect intrusion in WSN and classify Normal, DDOS, Grey hole, and Blink litter. The experimental analysis demonstrates that the proposed method achieves a packet delivery rate of 97.6%, 95.3% and 90.50% and reduces energy consumption by 19.6%, 12.5% and 17.4% compared to existing clustering-based routing methods. Consequently, the proposed technique surpasses current methods in terms of network lifetime, energy efficiency, and packet delivery performance.

Authors and Affiliations

Jeyaraman Sathiamoorthy , M. Usha and P. Senthilraja

Keywords

Related Articles

SAFE-ACID: A NOVEL SECURITY ASSESSMENT FRAMEWORK FOR IOT INTRUSION DETECTION VIA DEEP LEARNING

Internet of Things (IoT) intrusion detection is crucial for ensuring the security of interconnected devices in our digital world. With diverse devices communicating in complex networks, IoT environments face vulnerabilit...

SAREE TEXTURE ANALYSIS AND CLSSIFICATION VIA DEEP LEARNING FRAMEWORK

Indian women have worn sarees for centuries and have a significant market share in their clothing. Despite the ability to identify saree materials with tactile texture and the possibility to purchase online, it may not a...

SEMANTIC FEATURE ENABLED AGGLOMERATIVE CLUSTERING FOR INFORMATION TECHNOLOGY JOB PROFILE ANALYSIS

The maintenance and implementation of computer systems are the core activities of information technology. Database administration and network architecture are also included in information technology. Professionals have a...

REAL TIME REMOTE MONITORING VIA HORSE HEAD OPTIMIZATION DEEP LEARNING NETWORK

Over the past few decades, IoT has become indispensable in many industries. More people can now get healthcare and their general health can be improved thanks to recent developments in the healthcare sector. Predictive a...

IN-DEPTH EXPLORATION AND COMPARATIVE ASSESSMENT OF CUTTING-EDGE ALGORITHMS FOR IMPULSE NOISE ATTENUATION IN CORRUPTED VISUAL DATA

Image denoising is a vital process in image pre-processing, particularly for applications focused on image-based objectives. This process, which occurs during image acquisition and transmission, is crucial for enhancing...

Download PDF file
  • EP ID EP740352
  • DOI -
  • Views 52
  • Downloads 0

How To Cite

Jeyaraman Sathiamoorthy, M. Usha and P. Senthilraja (2024). SELECTIVE FORWARDING ATTACKS DETECTION IN WIRELESS SENSOR NETWORKS USING BLUE MONKEY OPTIMIZED GHOST NETWORK. International Journal of Data Science and Artificial Intelligence, 2(03), -. https://europub.co.uk/articles/-A-740352