Skip to main content
Log in

Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The article discusses the problem of analysis of cybersecurity threats in wireless ad hoc networks—VANET, FANET, MARINET, MANET, WSN. The problem of neural network approximation of the function of cyber threat existence in the system is formulated. The parameters of the neural network model were optimized according to the likelihood maximization criterion on the training data set. A hybrid neural network based on recurrent and graph convolutional neural networks is proposed as a solution architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.

Similar content being viewed by others

REFERENCES

  1. Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907–914.

    Article  Google Scholar 

  2. Komala, S.R., Srinivas Shetty, Padmashree, S., and Elevarasi, E., Wireless Ad Hoc Mobile Networks, National Conference on Computing Communication and Technology, 2010, pp. 168–174.

  3. Broch, J., Maltz, D.A., Johnson, D.B., Yih-Chun Hu, and Jetcheva, J., A Performance Comparison of Multi-hop Wireless Ad Hoc Network Routing Protocols. http://www.monarch.cs.cmu.edu/.

  4. Perkins, C. and Royer, E., Ad hoc on-demand distance vector routing, Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, 1999, pp. 90–100.

  5. Sumra, I., Ahmad, I., Hasbullah, H., and Manan, J., Classes of attacks in VANET, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC), 2011, pp. 1–5.

  6. Yifeng Zhou, Lamont, L., and Li Li, Wormhole attack detection based on distance verification and the use of hypothesis testing for wireless ad hoc networks, MILCOM 2009—2009 IEEE Military Communications Conference, Boston, 2009, pp. 1–7.

  7. Tamilselvan, L. and Sankaranarayanan, V., Prevention of blackhole attack in MANET, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), Sydney, 2007, p. 21.

  8. Hastad, J., Computational Limitations of Small-Depth Circuits, Cambridge, MA: MIT Press, 1987.

    Google Scholar 

  9. Yoshua Bengio, Learning deep architectures for AI, Found. Trends Mach. Learn., 2009, vol. 2, no. 1, pp. 1–127. http://dx.doi.org/.10.1561/2200000006

    Article  MATH  Google Scholar 

  10. Montufar, G., et al., On the number of linear regions of deep neural networks, Proc. 27th NIPS, Cambridge, MA, 2014, pp. 2924–2932.

  11. Perozzi, B., Al-Rfou, R., and Skiena, S., DeepWalk: Online learning of social representations, Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14), New York, 2014, pp. 701–710.

  12. Mikolov, T., Sutskever, I., Kai Chen, Corrado, G., and Dean, J., Distributed representations of words and phrases and their compositionality, Proceedings of the 26th International Conference on Neural Information Processing Systems (NIPS’13), Burges, C.J.C., Bottou, L., Welling, M., Ghahramani, Z., and Weinberger, K.Q., Eds., 2013, vol. 2, pp. 3111–3119.

  13. Xinghuo Yu, Efe, M.O., and Kaynak, O., A general backpropagation algorithm for feedforward neural networks learning, IEEE Trans. Neural Networks, 2002, vol. 13, no. 1, pp. 251–254.

    Article  Google Scholar 

  14. Kipf, T.N. and Welling, M., Semi-supervised classification with graph convolutional networks, CoRR abs/1609.02907, 2016.

  15. Hochreiter, S. and Schmidhuber, J., Long short-term memory, Neural Comput., 1997, vol. 9, no. 8, pp. 1735–1780.

    Article  Google Scholar 

Download references

ACKNOWLEDGMENTS

The project results are achieved using the resources of supercomputer center of Peter the Great St.Petersburg Polytechnic University – SCC “Polytechnichesky” (www.spbstu.ru).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to R. A. Demidov, P. D. Zegzhda or M. O. Kalinin.

Additional information

The article was translated by the authors.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Demidov, R.A., Zegzhda, P.D. & Kalinin, M.O. Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model. Aut. Control Comp. Sci. 52, 971–976 (2018). https://doi.org/10.3103/S0146411618080084

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080084

Keywords:

Navigation