Altmetrics
Downloads
361
Views
173
Comments
3
This version is not peer-reviewed
Cyber Security and Critical Infrastructures, 2nd Edition
Submitted:
05 January 2024
Posted:
05 January 2024
You are already at the latest version
Year | Main Focus of the Survey | Major Contributions | Enhancement in Research Papers |
2022 | A Complete Analysis of Security Attacks in MANET | Bharti et al. [2] reviewed to provide us with various types of security attacks like Sybil Attacks, Blackhole Attacks, Security Attacks, and Rushing Attacks. This paper is useful to prevent networks from security challenges. | The researcher gives a critical study, compares outcomes, and identifies holes in all known methodologies. |
2022 | A Comprehensive Review of Various Attacks in Mobile Ad Hoc Networks |
Shekhar et al. [3] introduce mobile ad hoc networks (MANETs) and numerous sorts of attacks in MANETs, as well as preventative measures stated by many researchers to limit their impact on network performance. | The researcher provides a thorough comparison review of all available methodologies as well as a detailed critical critique. |
2022 | An Overview of Risk Identification, Intrusion Detection, and Machine Learning Techniques used concerning MANETs |
Micheal et al. [4] provide an overview of existing studies on MANETs. It also Introduces a new technique to identify the primary Risk Profile of MANETS by using machine learning techniques. It discovers new areas of probability-based methods to further enhance the existing impact-based techniques for evaluating threats within MANETs. |
The researcher provides a thorough literature study as well as a solution to detect holes in existing strategies for preventing Sybil attacks on MANETs. |
2021 | Review on Security Attacks and Intrusion Detection Techniques in MANETs | Alazab et al. examined intrusion detection systems in the context of the mobile ad-hoc network. In MANET, however, a single classifier was employed to detect the amount of infiltration. Using a random forest model, a hybrid intelligent approach was developed to handle the challenges associated with a mixture of classifiers and minimize the best possible false alarm rates. Though the false positive rate was reduced by using several classifiers and increasing node density at different time intervals, the strategy was not an efficient model. | The researcher provides a full literature overview of existing methodologies as well as a thorough critical critique. It also incorporates strategies based on machine learning. |
2022 | An Analysis of Essential Challenges and Attacks on MANET Security Appraisal | Singla et al. [5] identify a variety of attacks on MANET and strategies for countering them. This research examines various security features, challenges, attacks, and solutions for repelling attacks in several stages. | The researcher conducts a thorough critical examination of all available approaches. However, research gaps and problems are noted as well. |
2015 | A Review on Sybil attack detection techniques | Kamani et al. [6] The surveyed document provides a brief overview of several Sybil attack detection mechanisms in VANET. |
The researcher thoroughly describes all existing procedures and identifies a superior technique. Furthermore, future research difficulties are indicated. |
2015 | Review on deduction and mitigation of Sybil attack in the Network | Bhise et al. [7] A review of the deduction method of Sybil's attacks in the social network system has been provided and debated. Several strategies for mitigating the Sybil attack have been investigated. The detection rate, false positive rate, false negative rate, and non-trustworthy rate of the investigated mechanisms were all calculated. | The researcher gives a critical study, compares outcomes, and identifies holes in all known methodologies. |
Word | Synonym 1 | Synonym 2 | Synonym 3 |
Detection | Identification | Recognition | Finding |
Machine Learning based identification of Sybil attack Recognition of Sybil attack based on Machine learning Finding Sybil’s attack on MANET | |||
Word | Synonym 1 | Synonym 2 | Synonym 3 |
Machine Learning | Deep Learning | Artificial Neural Networks | Computational Learning |
Detection of Sybil attack based on deep learning Role of artificial neural networks in the Detection of Sybil Attack Sybil attack detection based on computational learning |
Acronyms | Definition |
DR | Deduction Rate |
ST | Secure Transmission |
PR | Performance Rate |
DA | Detection Accuracy |
E | Effectiveness |
MR | Measuring Risk |
SM | Security Measurement |
SS | Secure Storage |
PC | Power Consumption |
C | Credibility |
Ref. | Scheme | Methodology |
[9] | Fuzzy Logic Scheme | Fuzzy logic is a mathematical approach that allows for imprecise reasoning and decision-making by representing uncertainty and ambiguity using linguistic variables and fuzzy sets. |
[14] | Support Vector Machines (SVM) | SVM is a supervised learning algorithm that can be used for binary classification of nodes as either genuine or Sybil based on input features such as the number of neighbors, message transmission frequency, and signal strength. |
[9] | Decision Trees | Decision trees are another supervised learning algorithm that can be used to classify nodes as genuine or Sybil. Decision trees use a hierarchical tree structure to recursively partition the input space and make decisions based on the input features. |
[11] | Random Forest | Random forest is an ensemble learning method that combines multiple decision trees to improve the accuracy of classification. It is a powerful technique that can handle high-dimensional feature spaces and noisy data. |
[10] | Convolutional Neural Networks (CNNs) | CNNs are a type of neural network commonly used for image recognition. However, they can also be used for detecting Sybil attacks in MANETs. CNNs use convolutional layers to extract features from the input data and learn spatial relationships between the features. |
Detection Algorithm | Effort Year | Technique | Shortcoming |
[9] | 2022 | Fuzzy Logic Scheme | The evaluation of the IDS is limited to simulations, which may not accurately reflect the performance of the IDS in real-world MANETs [20] |
[19] | 2020 | Support Vector Machines (SVM) | The proposed approach may not scale well to larger MANETs or more complex attack scenarios [17] |
[14] | 2023 | Decision Trees | The paper only uses a relatively small dataset to train and test the proposed models, which may limit the generalizability of the findings [18] |
[16] | 2020 | Random Forest | The paper evaluates the proposed system's performance using a real-world dataset, the evaluation is limited to a single scenario [19] |
[15] | 2021 | Convolutional Neural Networks (CNNs) | The paper proposes an AI-based approach, it does not offer significant novelty compared to existing research [20] |
Category | Challenges | Solutions |
Resource limitations [2] | In simulations, it is often assumed that nodes have unlimited computational resources, memory, and energy. However, in real-world MANETs, nodes have constrained resources, and the IDS needs to operate within these limitations. The impact of resource constraints on the performance and effectiveness of the IDS cannot be accurately assessed through simulations alone. | The solution to this challenge is Dataset analysis. It means analyzing real-world datasets collected from MANETs to evaluate the IDS's performance. [26] |
Lack of Scalability [25] | MANET security mechanisms should be scalable to accommodate the dynamic nature of the network, frequent topology changes, and node mobility. The proposed approach may lack the flexibility to adapt to varying network conditions or changing security requirements. This can limit its ability to scale well and provide robust security in larger MANETs or under complex attack scenarios. | Cross-layer design strategies allow information to be sent between layers of the network protocol stack, increasing the efficiency and scalability of security measures. [27] |
Limited Dataset [9] | Using a relatively small dataset to train and test the proposed model is a big challenge that can limit the generalizability of the findings. | Augmenting your existing dataset can help increase its size and diversity. This technique involves generating synthetic samples by applying transformations to the original data. By doing so, you can effectively expand your dataset and improve the generalizability of your models. [28] |
Lack of significant novelty [5] | Proposing an AI-based approach without significant novelty is a big challenge because it does not provide a specific novelty compared to existing research. | Explainable AI (XAI) addresses the lack of novelty by focusing on the interpretability and explainability of the AI system. [29] |
Reference | Name of Dataset | Features |
[30] | NSL-KDD dataset | It consists of approximately 1,074,992 single connection vectors each of which contains 41 features |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated