SELECTIVE FORWARDING ATTACKS DETECTION IN WIRELESS SENSOR NETWORKS USING BLUE MONKEY OPTIMIZED GHOST NETWORK

Abstract

Wireless Sensor Networks (WSNs) are increasingly the technology of choice due to their wide applicability in both military and civilian domains. The selective forwarding attack, one of the main attacks in WSNs, is the hardest denial-of- service attack to detect. The hostile nodes that initiate the selective forwarding attack will discard some or all of the data packets they receive. Numerous detection techniques for optional forwarding have been developed attacks are inaccurate or contain sophisticated algorithms, which is especially true when the attacker also uses other attacks like distributed denial of service, wormholes, and black holes to move through the network. To address these disadvantages, this research proposes a novel selective forwarding attack detection method based blue monkey-optimized ghost net (SAD-Ghost) method. To identify network threats, Blue Monkey optimization based on the hazard model is built in this case. A proposed technique to improve detection accuracy and minimize computation. The primary goal of the research is to develop a Selective Forwarding Attack Detection utilizing a blue Monkey optimized Ghost net to improve network lifetime. Initially, Blue Monkey optimization is used for optimal cluster head selection based on node degree and density. Moreover, cluster data are pre-processed using Tokenization, Normalization, and Reduction. The proposed method is utilized to detect intrusion in WSN and classify Normal, DDOS, Grey hole, and Blink litter. The experimental analysis demonstrates that the proposed method achieves a packet delivery rate of 97.6%, 95.3% and 90.50% and reduces energy consumption by 19.6%, 12.5% and 17.4% compared to existing clustering-based routing methods. Consequently, the proposed technique surpasses current methods in terms of network lifetime, energy efficiency, and packet delivery performance.

Authors and Affiliations

Jeyaraman Sathiamoorthy , M. Usha and P. Senthilraja

Keywords

Related Articles

DINGO OPTIMIZED FUZZY CNN TECHNIQUE FOR EFFICIENT PROTEIN STRUCTURE PREDICTION

Protein is made up of a variety of molecules that are required by living organisms, such as enzymes, hormones, and antibodies. In step 2, the max-pooling layer and the convolutional layer evaluate the input data to creat...

SELECTIVE FORWARDING ATTACKS DETECTION IN WIRELESS SENSOR NETWORKS USING BLUE MONKEY OPTIMIZED GHOST NETWORK

Wireless Sensor Networks (WSNs) are increasingly the technology of choice due to their wide applicability in both military and civilian domains. The selective forwarding attack, one of the main attacks in WSNs, is the ha...

HYBRIDIZATION OF DILATED CNN WITH ATTENTION LINK NET FOR BRAIN CANCER CLASSIFICATION

Brain tumours (BT) are highly prevalent and dangerous disease, have extremely short prognoses at the most malignant grade. Merging the MRI modes results in hybrid images with information that is used to classify tumours....

DEEP LEARNING BASED WEARABLE DEVICE FOR OLDER PEOPLE MONITORINGSYSTEM

Activity recognition (AR) systems for older people are common in residential health care settings such as hospitals and nursing homes, thus numerous methodologies and studies have been developed to improve the effectiven...

DYNAMIC LOAD BALANCING IN CLOUD COMPUTING USING HYBRID KOOKABURRA-PELICAN OPTIMIZATION ALGORITHMS

Cloud Computing (CC) technology facilitates virtualized computer resources to users via service providers. Load balancing assumes a critical role in distributing dynamic workloads across cloud systems, ensuring equitable...

Download PDF file
  • EP ID EP740352
  • DOI -
  • Views 48
  • Downloads 0

How To Cite

Jeyaraman Sathiamoorthy, M. Usha and P. Senthilraja (2024). SELECTIVE FORWARDING ATTACKS DETECTION IN WIRELESS SENSOR NETWORKS USING BLUE MONKEY OPTIMIZED GHOST NETWORK. International Journal of Data Science and Artificial Intelligence, 2(03), -. https://europub.co.uk/articles/-A-740352