Deep-efficient-guard: securing wireless ad hoc networks via graph neural network

被引:0
|
作者
Masood S. [1 ]
Zafar A. [1 ]
机构
[1] Department of Computer Science, Aligarh Muslim University, Aligarh
关键词
Deep learning; Deep learning architectures; Intrusion detection; Wireless ad hoc networks; Wireless ad hoc networks security;
D O I
10.1007/s41870-023-01702-z
中图分类号
学科分类号
摘要
This study presents a new intrusion detection system (IDS) for Wireless Ad hoc Networks, leveraging graph neural networks (GNN). Overcoming the challenges faced by traditional IDS in dynamic environments, our approach focuses on meticulous feature engineering and normalization for optimal efficiency. The proposed GNN based IDS, strategically placed at zone heads, effectively filters malicious packets while considering the limited resources of wireless devices. Evaluation on the NSL-KDD dataset demonstrates the GNN-based IDS's superiority over other models like Convolutional Neural Networks (CNNs) and Transformers, highlighting its adaptability to dynamic network environments. The GNN-based IDS excels in understanding complex dependencies, contributing to efficient intrusion detection and network security in resource-constrained Wireless Ad hoc environments. Emphasizing resource efficiency, our GNN-based approach proves practical for real-time intrusion detection in resource-constrained Wireless Ad hoc networks. This work not only emphasizes GNNs' transformative role in enhancing Wireless Ad hoc network security but also contributes to discussions on efficient intrusion detection, offering innovative solutions against emerging threats. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
引用
收藏
页码:4111 / 4126
页数:15
相关论文
共 50 条
  • [1] The guard zone in wireless ad hoc networks
    Hasan, Aamir
    Andrews, Jeffrey G.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (03) : 897 - 906
  • [2] On The Construction of Neural Networks via Wireless Ad Hoc Networks
    Wei, Zhiqing
    Guo, Zijun
    Ma, Jiteng
    Feng, Zhiyong
    2018 IEEE 87TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2018,
  • [3] Deep Neural Networks for Securing IoT Enabled Vehicular Ad-Hoc Networks
    Alladi, Tejasvi
    Agrawal, Ayush
    Gera, Bhavya
    Chamola, Vinay
    Sikdar, Biplab
    Guizani, Mohsen
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [4] Self-securing ad hoc wireless networks
    Luo, HY
    Zerfos, P
    Kong, HJ
    Lu, SW
    Zhang, LX
    ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 567 - 574
  • [5] Immune Inspired Approach for Securing Wireless Ad hoc Networks
    Mohamed, Yasir Abdelgadir
    Abdullah, Azween B.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 206 - 212
  • [6] Can Friendship Be Counted on for Securing Wireless Ad Hoc Networks?
    Liu, Lianggui
    Jia, Huiling
    Shu, Ting
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 259 - 270
  • [7] Securing resource-constrained wireless ad hoc networks
    Fang, Yuguang
    Zhang, Yanchao
    2007 IEEE SARNOFF SYMPOSIUM, 2007, : 477 - +
  • [8] SECURING RESOURCE-CONSTRAINED WIRELESS AD HOC NETWORKS
    Fang, Yuguang
    Zhu, Xiaoyan
    Zhang, Yanchao
    IEEE WIRELESS COMMUNICATIONS, 2009, 16 (02) : 24 - 29
  • [9] Securing DSR with mobile agents in wireless ad hoc networks
    Abosamra, Ahmed
    Hashem, Mohamed
    Darwish, Gamal
    EGYPTIAN INFORMATICS JOURNAL, 2011, 12 (01) : 29 - 36
  • [10] Network resource efficient routing in mobile ad hoc wireless networks
    Ahyoung Lee
    Ilkyeun Ra
    Telecommunication Systems, 2015, 60 : 215 - 223