• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

无线自组织网络中针对黑洞和虫洞攻击的创新跨层防御机制。

Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks.

作者信息

Srinivasan Jagadeesan

机构信息

Department of Software and Systems Engineering, School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, Tamil Nadu, India.

出版信息

Sci Rep. 2025 Apr 28;15(1):14747. doi: 10.1038/s41598-025-97094-0.

DOI:10.1038/s41598-025-97094-0
PMID:40289137
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12034816/
Abstract

Wireless ad-hoc networks operate independently of existing infrastructure, using devices like access points to connect end-user computing devices. Current methods face issues such as low detection accuracy, structural deviation, and extended processing times. This paper proposes a cross-layer approach that leverages knowledge from the physical and Medium Access Control (MAC) layers, which is then shared with higher layers to effectively mitigate wormhole and blackhole attacks. A wormhole attack disrupts communication through tunneling, while a blackhole attack manipulates network traffic by impersonating the source. The proposed cross-layer framework integrates the network, MAC, and physical layers, and is independent of specific network protocols. The physical layer handles channel interference, the network layer manages process handling, and the MAC layer oversees bandwidth information and tracks failed transmissions. Performance metrics are measured in seconds. The Enhanced Support Vector Machine (E-SVM) algorithm, implemented using NS3 software, demonstrates superior performance compared to traditional SVM techniques across multiple metrics, including average energy consumption, average remaining energy, packets received, packet delivery ratio, delay, jitter, throughput, normalized overhead, dropping ratio, and goodput. Simulation results show that E-SVM achieves a 12.5% dropping ratio, 98.459% energy consumption, and an 89.2879% packet delivery ratio, outperforming existing SVM techniques across various network sizes.

摘要

无线自组织网络独立于现有基础设施运行,使用接入点等设备连接终端用户计算设备。当前方法面临检测精度低、结构偏差和处理时间延长等问题。本文提出一种跨层方法,该方法利用物理层和介质访问控制(MAC)层的知识,然后与更高层共享,以有效缓解虫洞攻击和黑洞攻击。虫洞攻击通过隧道破坏通信,而黑洞攻击通过冒充源来操纵网络流量。所提出的跨层框架集成了网络层、MAC层和物理层,并且独立于特定网络协议。物理层处理信道干扰,网络层管理进程处理,MAC层监督带宽信息并跟踪传输失败情况。性能指标以秒为单位进行测量。使用NS3软件实现的增强支持向量机(E-SVM)算法在包括平均能耗、平均剩余能量、接收数据包、数据包交付率、延迟、抖动、吞吐量、归一化开销、丢弃率和有效吞吐量等多个指标上,相较于传统支持向量机技术表现出卓越性能。仿真结果表明,E-SVM实现了12.5%的丢弃率、98.459%的能耗以及89.2879%的数据包交付率,在各种网络规模上均优于现有支持向量机技术。

相似文献

1
Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks.无线自组织网络中针对黑洞和虫洞攻击的创新跨层防御机制。
Sci Rep. 2025 Apr 28;15(1):14747. doi: 10.1038/s41598-025-97094-0.
2
Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs.移动自组网中基于入侵感知按需路由的安全生物启发式优化
Sci Rep. 2025 Jul 13;15(1):25335. doi: 10.1038/s41598-025-99269-1.
3
A dual layer secure and energy-efficient model for border surveillance using sea lion inspired strategy in wireless sensor networks.一种在无线传感器网络中使用受海狮启发的策略进行边界监测的双层安全且节能模型。
Sci Rep. 2025 Jul 10;15(1):24974. doi: 10.1038/s41598-025-07999-z.
4
Short-Term Memory Impairment短期记忆障碍
5
GAN-enhanced deep learning for improved Alzheimer's disease classification and longitudinal brain change analysis.用于改善阿尔茨海默病分类和纵向脑变化分析的生成对抗网络增强深度学习
Front Med (Lausanne). 2025 Jun 17;12:1587026. doi: 10.3389/fmed.2025.1587026. eCollection 2025.
6
Optimizing security and energy efficiency in IoT-Based health monitoring systems for wireless body area networks.优化用于无线体域网的基于物联网的健康监测系统的安全性和能源效率。
Sci Rep. 2025 Jul 10;15(1):24921. doi: 10.1038/s41598-025-11253-x.
7
Enhanced SVM-based model for predicting cyberspace vulnerabilities: Analyzing the role of user group dynamics and capital influx.基于支持向量机的增强型网络空间漏洞预测模型:分析用户群体动态和资本流入的作用。
PLoS One. 2025 Jul 17;20(7):e0327476. doi: 10.1371/journal.pone.0327476. eCollection 2025.
8
Attention-driven hybrid deep learning and SVM model for early Alzheimer's diagnosis using neuroimaging fusion.基于注意力驱动的混合深度学习与支持向量机模型用于利用神经影像融合进行早期阿尔茨海默病诊断
BMC Med Inform Decis Mak. 2025 Jul 1;25(1):219. doi: 10.1186/s12911-025-03073-w.
9
P300 ERP System Utilizing Wireless Visual Stimulus Presentation Devices.使用无线视觉刺激呈现设备的P300事件相关电位系统
Sensors (Basel). 2025 Jun 7;25(12):3592. doi: 10.3390/s25123592.
10
QCAE-QOC-SVM: A hybrid quantum machine learning model for DoS and Fuzzy attack detection on autonomous vehicle CAN bus.QCAE-QOC-SVM:一种用于自动驾驶汽车CAN总线拒绝服务和模糊攻击检测的混合量子机器学习模型。
MethodsX. 2025 Jun 26;15:103471. doi: 10.1016/j.mex.2025.103471. eCollection 2025 Dec.