Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.09Keywords:
MANET, Sybil attack, AdaBagging, Ensemble regressive arboretum, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Independent wireless communication is possible in a "mobile ad hoc network" regardless of any predefined administrative or physical framework. The comprehensive enhancement of services for these networks depends on protecting their interactions. The Sybil attack creates numerous counterfeit identities to disrupt the system's remote functionalities. Implementing a security plan necessitates the establishment of a trust model that delineates the confidence relationships among entities. The trust structure in mobile ad hoc network security has been extensively researched. Mobile ad hoc networks are intrinsically more vulnerable to security breaches than wired networks because of their wireless characteristics. The primary factors contributing to this are energy limitations and security vulnerabilities. A comprehensive methodology has been established to improve the identification of Sybil attacks in MANETs. The system employs two advanced machine learning approaches, Ensemble Regressive Arboretum and AdaBagging, alongside network-feature extraction. Numerous trust models have been developed by integrating AdaBagging and the Ensemble Regressive Arboretum, while most known approaches rely on a singular framework. A Sybil assault transpires when a few numbers of individuals masquerade as numerous peers to obtain unauthorized access to a significant portion of the system. This research employs a machine learning methodology to identify Sybil attacks in MANETs by collecting network metrics such as traffic characteristics, communication patterns, and node activities.Abstract
How to Cite
Downloads
Similar Articles
- G. Deena, K. Raja, M. Azhagiri, W.A. Breen, S. Prema, Application of support vector classifier for mango leaf disease classification , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- B. Kalpana, P. Krishnamoorthy, S. Kanageswari, Anitha J. Albert, Machine learning approaches for predicting species interactions in dynamic ecosystems , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Josephine Theresa S, Graph Neural Network Ensemble with Particle Swarm Optimization for Privacy-Preserving Thermal Comfort Prediction , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Jhankar Moolchandani, Kulvinder Singh, English language analysis using pattern recognition and machine learning , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Deepika S, Jaisankar N, A novel approach to heart disease classification using echocardiogram videos with transfer learning architecture and MVCNN integration , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- M. Prabhu, A. Chandrabose, Improving the resource allocation with enhanced learning in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- P. Vivekananth, Navneet Sharma, Cyberbullying Detection Using Continuous Based Bag of Words with Machine Learning by Text Classification , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Distribution of virtual machines with SVM-FFDM approach in cloud computing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Engida Admassu, Classifying enset based on their disease tolerance using deep learning , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Bhaskar Pandya, Pradipsinh Zala, Vocational education and lifelong learning: Preparing a skilled workforce for the future , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

