AI-enhanced security demand and routing management for MANETs with optical technologies

被引:2
|
作者
Jia, Xuetao [1 ]
Huang, Donggui [1 ]
Qin, Na [2 ]
机构
[1] Liuzhou Railway Vocat Tech Coll, Commun & Internet Things, Liuzhou 545616, Guangxi, Peoples R China
[2] Southwest Jiaotong Univ, Elect Engn, Chengdu 611756, Sichuan, Peoples R China
关键词
Security management; Routing management; Mamdani routing system; Stacked reinforcement learning; Honey pot analysis; Optical technology;
D O I
10.1007/s11082-023-05792-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The proliferation of Mobile Ad hoc Networks (MANETs), where nodes connect with one another to offer the required real-time entertainment services, is where academics are focusing more attention as a result of recent breakthroughs in wireless communication. Decentralised design and wireless connection of MANETs, however, make building safe routing a difficult problem. Artificial Intelligence (AI) and optical technologies have attracted a lot of attention as a way to address these security issues and improve network performance. This study uses a machine learning model to provide a unique security management and routing management method for MANETs. Here, trust-based multi-tier honey pot analysis with stacked reinforcement learning (MHSRL) is used to monitor the security of the network. The linear gradient Distance Vector dynamic Mamdani routing system (LGDVDMR) is used to regulate network routing. For different security-based datasets, experimental analysis is done in terms of throughput, end-end latency, packet delivery ratio, and trust analysis. Generated graph executes both the performance graph and the packet drop. The results of research studies indicate that our method locates the closest node that is the safest and finds problematic nodes with a tolerable load. Proposed technique attained throughput 96%, trust analysis 98%, end-end delay of 59%, packet delivery ratio of 79%.
引用
收藏
页数:17
相关论文
共 30 条
  • [21] Self-organized public key management in MANETs with enhanced security and without certificate-chains
    Maity, Soumyadev
    Hansdah, R. C.
    COMPUTER NETWORKS, 2014, 65 : 183 - 211
  • [22] AI-enhanced multi-stage learning-to-learning approach for secure smart cities load management in IoT networks
    Wang, Boyu
    Dabbaghjamanesh, Morteza
    Kavousi-Fard, Abdollah
    Yue, Yuntao
    AD HOC NETWORKS, 2024, 164
  • [23] Optimizing type 2 diabetes management: AI-enhanced time series analysis of continuous glucose monitoring data for personalized dietary intervention
    Anjum M.
    Saher R.
    Saeed M.N.
    PeerJ Computer Science, 2024, 10
  • [24] Optimizing type 2 diabetes management: AI-enhanced time series analysis of continuous glucose monitoring data for personalized dietary intervention
    Anjum, Madiha
    Saher, Raazia
    Saeed, Muhammad Noman
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [25] Security enhanced routing and spectrum allocation against crosstalk attacks for confidential lightpath in elastic optical networks
    Hu, Liyazhou
    Wang, Wei
    Pan, Yuanyuan
    Liu, Tianhe
    Li, Yajie
    Zhao, Yongli
    Li, Jianqing
    OPTICS EXPRESS, 2024, 32 (05): : 7254 - 7275
  • [26] AI-enhanced power quality management in distribution systems: implementing a dual-phase UPQC control with adaptive neural networks and optimized PI controllers
    Singh, Arvind R.
    Dashtdar, Masoud
    Bajaj, Mohit
    Garmsiri, Reza
    Blazek, Vojtech
    Prokop, Lukas
    Misak, Stanislav
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (11)
  • [27] Network coding-based routing and spectrum allocation in elastic optical networks for enhanced physical layer security
    Savva, Giannis
    Manousakis, Konstantinos
    Ellinas, Georgios
    PHOTONIC NETWORK COMMUNICATIONS, 2020, 40 (03) : 160 - 174
  • [28] Network coding-based routing and spectrum allocation in elastic optical networks for enhanced physical layer security
    Giannis Savva
    Konstantinos Manousakis
    Georgios Ellinas
    Photonic Network Communications, 2020, 40 : 160 - 174
  • [29] Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies
    Wijesundara, W. M. A. B.
    Lee, Joong-Sun
    Tith, Dara
    Aloupogianni, Eleni
    Suzuki, Hiroyuki
    Obi, Takashi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 1927 - 1937
  • [30] Optical fiber management and testing system for PON enhanced with identification technologies using a mobile access terminal with a two-dimensional code scanner and fault isolation technologies using high spatial resolution OTDR
    Enomoto, Yoshitaka
    Izumita, Hisashi
    Arii, Masahito
    JOURNAL OF OPTICAL NETWORKING, 2007, 6 (05): : 408 - 414