major detection methods such as the type of attacks
addressed and architecture in MANET. Furthermore,
artificial intelligence methodology called Neural
network considers an important method that can be
used to detect this attack paradigm attempts towards
mimic biological neural network structure and
functionality. The neuron takes the basic
construction block into account; the model includes
three easy rules: summing, multiplying, and
activation (A. Krenker, J. Bešter, & A. Kos, 2011).
In this type of attack, there are usually two cases
in which the data packet is obtained using a
malicious node; one where a malicious node uses the
routing protocol such as the AODV protocol, to send
route reaction control message (RREP) immediately
to the source node upon receipt of the route request
control node (RREQ). This RREQ overflow causes
unnecessary overhead that leads to reduced network
performance such as the delivery of packets and
latency. The success of the RREQ broadcast will
suffer from a hidden node problem. So it drops the
data directly. Therefore, the source node became un
incapable to send its data to the destination node
which disturbs the influence of the network and its
connectivity (L. Prajapati & A. S. Tomar, 2015). A
method to detect and prevention black hole attacks
in MANETs is proposed in this paper.
Moreover, by monitoring their neighbor's
actions, the system detects malicious nodes. If a
suspicious behavioral anode is found, declare the
suspicious node and send a threatening message. By
refusing all data forms, the black hole nodes are
isolated from the network. In the Network
Simulator, MATLAB simulations are performed to
test the performance of the technology proposed.
The results show that all types of black hole nodes
are identified and isolated by a proposed mechanism.
In this paper, focus on security challenges when
designing security schemes for MANETs, hence in
this work proposed a hybrid of PSO and GNN to
defense against Blackhole attack that targeting the
MANTs. The rest of the paper is organized in
section 2 are provided the relevant research. Section
3 outlines the scheme we are proposing while being
discussed in Section 3. 4, results, and desiccations
are shown. Last but not least, Section.5 is the
conclusion paper.
2
THEORETICAL AND
PREVIOUS STUDIES
Generally, the main assumption considered in the
MANET is that each node is a trusted node.
However, in a real scenario, some unreliable nodes
misbehave and launch the attack in a network like
Blackhole in which the misbehaving nodes attract all
the traffic towards itself by giving false information
of having the shortest path towards the destination
with a very high destination sequence number. This
section discussed different methods to detect or
prevent Blackhole attacks.
2.1
MANETs
MANETs have many users in many fields as such as
the modern technology revolution and its great
development, has a dynamic topology, no need for
infrastructure.
On MANETS, PSO and GNN algorithms were
suggested, each offering an effective implementation
technique. However, several investigators have
suggested various approaches to the black hole
attacks in MANETs. Most of these methods can be
classified into various categories such as the
following: In the work of (Omidvar & Mohammadi,
2014) the PSO algorithm has been suggested which
use the maximum flow objective to decide best node
locations for each network operation step, this
method adds some delay in the process time
discovery as intermediate nodes, computation time.
Presented technique by (Prajapati & Tomar, 2015)
this technique is called PSO of the AODV protocol
to find a solution for many network attacker nodes.
PSO tracks nodes by changing ad hoc values, if the
node converges then it switches node value to
endless and prevents the node from sending a
packet. This method has a drawback such as a delay
packed drop. However, the scheme needs to be
further analyzed, since values are modified after a
specific time period. Therefore, shorter update time
requires more overhead processing if accuracy of
detection decreases.
In the previous work of (A. Kaur, P. Kaur, & H.
Aggarwal, 2017) suggested using GA and PSO for
AODV routing protocols to detect the Blackhole in
WSN. By using this approach, it reduces power
consumption and finds the best bath from the source
to the destination suggested used genetic algorithm
(R. Garg & V. Mongia, 2018) with one type of
routing protocol called AODV for preventing the
Blackhole attack these methods need time toward
finding intruder node equal 13.2 whether suggestion
algorithm takes 0.64 times with 200 node The
scheme needs to be further analyzed, since values
are modified after a specific time period. So the
shorter update period requires more overhead,