Skip to main content

Detecting Fake News in MANET Messaging Using an Ensemble Based Computational Social System

  • Conference paper
  • First Online:
Image Analysis and Processing. ICIAP 2022 Workshops (ICIAP 2022)

Abstract

Mobile Adhoc Networks (MANETs) are utilised in a variety of mission-critical situations and as such, it is important to detect any fake news that exists in such networks. This research proposes an Ensemble Based Computational Social System for fake news detection in MANET messaging. As such this research combines the power of Veracity, a unique, computational social system with that of Legitimacy, a dedicated ensemble learning technique, to detect fake news in MANET messaging. Veracity uses five algorithms namely, VerifyNews, CompareText, PredictCred, CredScore and EyeTruth for the capture, computation and analysis of the credibility and content data features using computational social intelligence. To validate Veracity, a dataset of publisher credibility-based and message content-based features is generated to predict fake news. To analyse the data features, Legitimacy, a unique ensemble learning prediction model is used. Four analytical methodologies are used to analyse these experimental results. The analysis of the results reports a satisfactory performance of the Veracity architecture combined with the Legitimacy model for the task of fake news detection in MANET messaging.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. (2020). https://developers.google.com/machine-learning/crash-course/classification/roc-and-auc

  2. Ahmad, I., Yousaf, M., Yousaf, S., Ahmad, M.O.: Fake news detection using machine learning ensemble methods. Complexity 2020 (2020)

    Google Scholar 

  3. Blackstock, O., Blackstock, U.: Opinion | we’re not calling out Nicki Minaj. We’re calling her in. The Washington Post (2021). https://www.washingtonpost.com/opinions/2021/09/17/nicki-minaj-vaccine-tweet-covid-infertility-misinformation/. Accessed 20 Apr 2022

  4. Brownlee, J.: How to use ROC curves and precision-recall curves for classification in Python. Machine Learning Mastery (2019)

    Google Scholar 

  5. Choudhary, R., Gianey, H.K.: Comprehensive review on supervised machine learning algorithms. In: 2017 International Conference on Machine Learning and Data Science (MLDS), pp. 37–43 (2017)

    Google Scholar 

  6. Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006)

    Article  MathSciNet  Google Scholar 

  7. Ibrahim Salim, M., Razak, T.A., Murugan, R.: A hybrid outlier detection approach with multi dimensional features to prevent black hole attack in MANET. Inf. Technol. Ind. 9(1), 541–548 (2021)

    Google Scholar 

  8. Khan, J.M., Younus (2019). https://docs.microsoft.com/en-us/azure/machine-learning/studio

  9. Khan, J.Y., Khondaker, M.T.I., Afroz, S., Uddin, G., Iqbal, A.: A benchmark study of machine learning models for online fake news detection. Mach. Learn. Appl. 4, 100032 (2021)

    Google Scholar 

  10. Kirasich, K., Smith, T., Sadler, B.: Random forest vs logistic regression: binary classification for heterogeneous datasets. SMU Data Sci. Rev. 1(3), 9 (2018)

    Google Scholar 

  11. Liang, X.: Introduction. In: Liang, X. (ed.) Social Computing with Artificial Intelligence, pp. 1–7. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-7760-4_1

    Chapter  Google Scholar 

  12. Nazir, M.: A novel review on security and routing protocols in MANET. Commun. Netw. 8(4), 205–218 (2016)

    Article  Google Scholar 

  13. Qayyum, T.: FogNetSim++: a toolkit for modeling and simulation of distributed fog environment. IEEE Access 6, 63570–63583 (2018)

    Article  Google Scholar 

  14. Ramkissoon, A.N., Mohammed, S.: An experimental evaluation of data classification models for credibility based fake news detection. In: 2020 International Conference on Data Mining Workshops (ICDMW), pp. 93–100 (2020)

    Google Scholar 

  15. Ramkissoon, A.N., Goodridge, W.: Legitimacy: an ensemble learning model for credibility based fake news detection. In: 2021 International Conference on Data Mining Workshops (ICDMW), pp. 254–261. IEEE (2021)

    Google Scholar 

  16. Ramkissoon, A.N., Goodridge, W.: Veracity: a fake news detection architecture for MANET messaging. In: 2021 8th International Conference on Information, Cybernetics, and Computational Social Systems (ICCSS), pp. 402–407. IEEE (2021)

    Google Scholar 

  17. Roy, A., Basak, K., Ekbal, A., Bhattacharyya, P.: A deep ensemble framework for fake news detection and classification. arXiv preprint arXiv:1811.04670 (2018)

  18. Shu, K.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22–36 (2017)

    Article  Google Scholar 

  19. Sohail, M.: Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic. IET Inf. Secur. 13(3), 223–230 (2019)

    Article  Google Scholar 

  20. Stieglitz, S., Fuchß, C.: Challenges of MANET for mobile social networks. Procedia Comput. Sci. 5, 820–825 (2011)

    Article  Google Scholar 

  21. Ukraine: A timeline of cyberattacks. CyberPeace Institute, 8 March 2022. https://cyberpeaceinstitute.org/ukraine-timeline-of-cyberattacks/. Accessed 11 Mar 2022

  22. Vuk, M., Curk, T.: ROC curve, lift chart and calibration plot. Metodoloski zvezki 3(1), 89 (2006)

    Google Scholar 

  23. Xiao, Y., Liu, Y., Li, T.: Edge computing and blockchain for quick fake news detection in IoV. Sensors 20(16), 4360 (2020)

    Article  Google Scholar 

  24. Yuksel, S.E., Wilson, J.N., Gader, P.D.: Twenty years of mixture of experts. IEEE Trans. Neural Netw. Learn. Syst. 23, 1177–1193 (2012)

    Article  Google Scholar 

  25. Zahra, K., Imran, M., Ostermann, F.O.: Automatic identification of eyewitness messages on Twitter during disasters. Inf. Process. Manage. 57(1), 102107 (2020)

    Article  Google Scholar 

  26. Zhang, D., Wang, J., Zhao, X.: Estimating the uncertainty of average F1 scores. In: Proceedings of the 2015 International Conference on the Theory of Information Retrieval, pp. 317–320 (2015)

    Google Scholar 

  27. Zhang, X., Ghorbani, A.A.: An overview of online fake news: characterization, detection, and discussion. Inf. Process. Manage. 57(2), 102025 (2020)

    Article  Google Scholar 

  28. Zhou, X., Zafarani, R.: Fake news: a survey of research, detection methods, and opportunities (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Neil Ramkissoon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ramkissoon, A.N., Goodridge, W. (2022). Detecting Fake News in MANET Messaging Using an Ensemble Based Computational Social System. In: Mazzeo, P.L., Frontoni, E., Sclaroff, S., Distante, C. (eds) Image Analysis and Processing. ICIAP 2022 Workshops. ICIAP 2022. Lecture Notes in Computer Science, vol 13374. Springer, Cham. https://doi.org/10.1007/978-3-031-13324-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-13324-4_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-13323-7

  • Online ISBN: 978-3-031-13324-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics