Wormhole attack detection in ad hoc network using machine learning technique
Title | Wormhole attack detection in ad hoc network using machine learning technique |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Prasad, Mahendra, Tripathi, Sachin, Dahal, Keshav |
Conference Name | 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) |
Keywords | ad hoc network, ad hoc network environment, Ad Hoc Network Security, Ad hoc networks, compositionality, data collection operation, data generation, detection rate, false alarm rate, feature selection, final task, learning (artificial intelligence), machine learning, machine learning algorithms, machine learning technique, Metrics, multiple wormhole tunnels, naive Bayes, Peer-to-peer computing, pubcrawl, Resiliency, security, stochastic gradient descent, Task Analysis, telecommunication security, Training, wormhole attack, wormhole attack detection |
Abstract | In this paper, we explore the use of machine learning technique for wormhole attack detection in ad hoc network. This work has categorized into three major tasks. One of our tasks is a simulation of wormhole attack in an ad hoc network environment with multiple wormhole tunnels. A next task is the characterization of packet attributes that lead to feature selection. Consequently, we perform data generation and data collection operation that provide large volume dataset. The final task is applied to machine learning technique for wormhole attack detection. Prior to this, a wormhole attack has detected using traditional approaches. In those, a Multirate-DelPHI is shown best results as detection rate is 90%, and the false alarm rate is 20%. We conduct experiments and illustrate that our method performs better resulting in all statistical parameters such as detection rate is 93.12% and false alarm rate is 5.3%. Furthermore, we have also shown results on various statistical parameters such as Precision, F-measure, MCC, and Accuracy. |
DOI | 10.1109/ICCCNT45670.2019.8944634 |
Citation Key | prasad_wormhole_2019 |
- machine learning algorithms
- wormhole attack detection
- wormhole attack
- Training
- telecommunication security
- Task Analysis
- stochastic gradient descent
- security
- Resiliency
- Peer-to-peer computing
- Naive Bayes
- multiple wormhole tunnels
- Metrics
- machine learning technique
- pubcrawl
- machine learning
- learning (artificial intelligence)
- final task
- Feature Selection
- false alarm rate
- detection rate
- data generation
- data collection operation
- Compositionality
- Ad hoc networks
- Ad Hoc Network Security
- ad hoc network environment
- ad hoc network