Multi-hop Network Security Strategy Integrating ACO Algorithm and PSO Algorithm
Abstract
Multi-hop networks are widely used due to their wide coverage and strong adaptability. However, multi-hop networks are prone to attacks and user privacy breaches when transmitting data between nodes. Therefore, a multi-hop network security protection strategy binding particle swarm optimization algorithm and ant colony algorithm was proposed. Support vector machine was utilized for data sorting, and the particle swarm algorithm was improved using inertia weight coefficients. The heuristic function and pheromone update strategy of ant colony algorithm was optimized, and the penalty factor and kernel function of support vector machine were optimized using fusion algorithm. The experimental results showed that the information exposure probability of the fusion algorithm decreased from the initial 0.35% to 0.10%, the detection accuracy was 2.9% higher than that of the second-best method, respectively, and the hazardous response time, disposal time, and root-mean-square error were faster than that of the second-best method by 19.9ms, 22.7ms, and -2.3ms. The running cost of the fusion algorithm was 210 datasets lower than that of the second-best method, and the average computation time was only 27.2ms higher than the normal support vector machine, and the time complexity was lower for all of them. From this, it can be concluded that fusion algorithms can effectively enhance the detection capability of abnormal data, reduce the probability of user privacy data exposure, decrease algorithm operating costs, and improve the response and handling speed of multi-hop networks when facing attacks.DOI:
https://doi.org/10.31449/inf.v49i17.7499Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







