{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T20:49:03Z","timestamp":1771793343737,"version":"3.50.1"},"reference-count":27,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2021,8,11]]},"abstract":"<jats:p>Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in MANETs. Basically, by adding adapted LEACH routing protocol to MANET, enhancement of the preserved nodes vitality will be achieved, moreover, the load balancing with data loss reduction provides MANET ability to tracks along with shortest and limited paths. This paper proposes a newly developed detection scheme for both active and passive black-hole attacks in MANETs. Moreover, the scheme deals with assessing a group of selected features for each node-based AdaBoost-SVM algorithm. These features are collected from cluster members nodes based on Ad hoc On-demand Multipath Distance Vector (OMDV) with LEACH routing protocol clustering approaches. Although SVM is considered a more stable classifier, there are great influences of the AdaBoost weight adaption algorithm to enhance the classification process in terms of strengthening the weights of extracted features. This hybrid algorithm is essential for active black-hole attacks as well as for identifying passive black-hole attacks in MANET. The proposed scheme is tested against the effect of mobility variation to determine the accuracy of the detection process including the routing overhead protocol. The experimental results investigated that the accuracy of detecting both active and passive black-holes attacks in MANET reached 97% with a promising time complexity for different mobility conditions. Moreover, the proposed scheme provides an accurate decision about malicious vs benign node dropping behavior using an adjustable threshold value.<\/jats:p>","DOI":"10.3233\/jifs-202471","type":"journal-article","created":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T10:17:52Z","timestamp":1626430672000},"page":"669-682","source":"Crossref","is-referenced-by-count":8,"title":["Detection of black-hole attacks in MANET using adaboost support vector machine"],"prefix":"10.1177","volume":"41","author":[{"given":"Noha A.","family":"Hikal","sequence":"first","affiliation":[{"name":"Department of Information Technology, Faculty of Computer and Information Sciences, Mansoura University, Egypt"}]},{"given":"Mahmoud Y.","family":"Shams","sequence":"additional","affiliation":[{"name":"Department of Machine Learning and Information Retrieval, Faculty of Artificial Intelligence, Kafrelsheikh University, Kafrelshiekh, Egypt"}]},{"given":"Hanaa","family":"Salem","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Delta University forScience and Technology, Gamasa, Egypt"}]},{"given":"Marwa M.","family":"Eid","sequence":"additional","affiliation":[{"name":"Department of Communications and Electronics, Delta Higher Institute for Engineering and Technology (DHIET), Mansoura, Egypt"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-202471_ref1","doi-asserted-by":"crossref","unstructured":"Anbarasan M. , Prakash S. , Anand M. and Antonidoss A. , Improving performance in mobile ad hoc networks by reliable path selection routing using RPS-LEACH, Concurrency and Computation-Practice & Experience 31(7) (2019).","DOI":"10.1002\/cpe.4984"},{"issue":"12","key":"10.3233\/JIFS-202471_ref2","first-page":"11","article-title":"Energy consumption optimization using clustering in mobile ad-hoc network","volume":"168","author":"Chandel","year":"2017","journal-title":"Int J Comput Appl"},{"key":"10.3233\/JIFS-202471_ref3","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.procs.2016.02.091","article-title":"Survey on algorithms for efficient cluster formation and cluster head selection in MANET","volume":"78","author":"Gavhale","year":"2016","journal-title":"Procedia Computer Science"},{"key":"10.3233\/JIFS-202471_ref4","doi-asserted-by":"crossref","first-page":"537","DOI":"10.3844\/jcssp.2017.537.547","article-title":"A comprehensive review and performance evaluation of detection techniques of black hole attack in MANET","volume":"13","author":"Jangir","year":"2017","journal-title":"J Comput Sci"},{"key":"10.3233\/JIFS-202471_ref6","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.procs.2016.07.363","article-title":"Security issues in mobile ad hoc networks","volume":"92","author":"Sarika","year":"2016","journal-title":"Procedia Computer Science"},{"key":"10.3233\/JIFS-202471_ref8","unstructured":"Meenatchi I. and Palanivel K. , Intrusion detection system in MANETS: a survey, International Journal of Recent Development in Engineering and Technology 3(4) (2014)."},{"issue":"5","key":"10.3233\/JIFS-202471_ref9","doi-asserted-by":"crossref","first-page":"64","DOI":"10.5815\/ijcnis.2013.05.08","article-title":"Effect of Black hole Attack on MANET routing protocols","volume":"5","author":"Kumar","year":"2013","journal-title":"International Journal of Computer Network and Information Security"},{"key":"10.3233\/JIFS-202471_ref11","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.cosrev.2019.03.001","article-title":"A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs","volume":"32","author":"Khanna","year":"2019","journal-title":"Computer Science Review"},{"key":"10.3233\/JIFS-202471_ref13","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.aasri.2013.10.073","article-title":"Analysis of reactive routing protocol using fuzzy inference system","volume":"5","author":"Doja","year":"2013","journal-title":"AASRI Procedia"},{"key":"10.3233\/JIFS-202471_ref15","doi-asserted-by":"crossref","unstructured":"Elwahsh H. , Gamal M. , Salama A.A. and El-Henawy I.M. , A novel approach for classifying Manets attacks with a neutrosophic intelligent system based on genetic algorithm, Security and Communication Networks 2018 (2018).","DOI":"10.1155\/2018\/5828517"},{"key":"10.3233\/JIFS-202471_ref16","first-page":"4261","article-title":"A novel technique to detect and prevent black hole attack in MANET","volume":"3","author":"Kaur","year":"2015","journal-title":"Int J Innov Res Sci Eng Technol"},{"key":"10.3233\/JIFS-202471_ref17","doi-asserted-by":"crossref","unstructured":"Koujalagi A. , Considerable detection of black hole attack and analyzing its performance on AODV routing protocol in MANET (mobile ad hoc network), Am J Comput Sci Inf Technol 6(2) (2018).","DOI":"10.21767\/2349-3917.100025"},{"key":"10.3233\/JIFS-202471_ref18","first-page":"37","article-title":"Support vector machine with improved particle swarm optimization model for intrusion detection","volume":"7","author":"Yazhini","year":"2016","journal-title":"Int J Sci Eng Res"},{"issue":"10","key":"10.3233\/JIFS-202471_ref19","first-page":"214","article-title":"Analysis of black hole effect and prevention through ids in manet","volume":"2","author":"Nisha","year":"2013","journal-title":"American Journal of Engineering Research (AJER)"},{"issue":"2","key":"10.3233\/JIFS-202471_ref22","first-page":"13","article-title":"Anomaly detection system for routing attacks in mobile ad hoc networks","volume":"5","author":"Pavani","year":"2014","journal-title":"International Journal on Network Security"},{"key":"10.3233\/JIFS-202471_ref24","doi-asserted-by":"crossref","first-page":"95197","DOI":"10.1109\/ACCESS.2019.2928804","article-title":"BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map","volume":"7","author":"El-Semary","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-202471_ref25","doi-asserted-by":"crossref","unstructured":"Yasin A. and Abu Zant M. , Detecting and isolating black-hole attacks in MANET using timer based baited technique, Wireless Communications and Mobile Computing 2018 (2018).","DOI":"10.1155\/2018\/9812135"},{"issue":"4","key":"10.3233\/JIFS-202471_ref28","doi-asserted-by":"crossref","first-page":"e5017","DOI":"10.1002\/cpe.5017","article-title":"Narayanan and G. Murugaboopathi, Modified secure AODV protocol to prevent wormhole attack in MANET","volume":"32","author":"Sankara","year":"2020","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"10.3233\/JIFS-202471_ref29","doi-asserted-by":"crossref","unstructured":"Anwar R.W. , Bakhtiari M. , Zainal A. and Qureshi K.N. , Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks, Jurnal Teknologi 78(4\u20133) (2016).","DOI":"10.11113\/jt.v78.8254"},{"key":"10.3233\/JIFS-202471_ref30","doi-asserted-by":"crossref","first-page":"6975","DOI":"10.1109\/ACCESS.2018.2793841","article-title":"Denial of service defence for resource availability in wireless sensor networks","volume":"6","author":"Osanaiye","year":"2018","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-202471_ref33","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1016\/j.phpro.2012.03.160","article-title":"Ada Boost for feature selection, classification and its relation with SVM, a review","volume":"25","author":"Wang","year":"2012","journal-title":"Physics Procedia"},{"key":"10.3233\/JIFS-202471_ref34","doi-asserted-by":"crossref","first-page":"00222","DOI":"10.1051\/matecconf\/201713900222","article-title":"Ada Boost typical Algorithm and its application research, in","volume":"139","author":"Chengsheng","year":"2017","journal-title":"MATEC Web of Conferences"},{"issue":"2","key":"10.3233\/JIFS-202471_ref35","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1016\/j.jnca.2012.12.001","article-title":"A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks","volume":"36","author":"Tyagi","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"key":"10.3233\/JIFS-202471_ref36","doi-asserted-by":"crossref","unstructured":"Sarhan S. , Nasr A.A. and Shams M.Y. , Multipose Face Recognition-Based Combined Adaptive Deep Learning Vector Quantization, Computational Intelligence and Neuroscience 2020 (2020).","DOI":"10.1155\/2020\/8821868"},{"issue":"5","key":"10.3233\/JIFS-202471_ref37","doi-asserted-by":"crossref","first-page":"417","DOI":"10.7763\/IJMLC.2014.V4.447","article-title":"A deep analysis of the precision formula for imbalanced class distribution","volume":"4","author":"Armah","year":"2014","journal-title":"International Journal of Machine Learning and Computing"},{"issue":"5","key":"10.3233\/JIFS-202471_ref38","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1109\/72.788640","article-title":"An overview of statistical learning theory","volume":"10","author":"Vapnik","year":"1999","journal-title":"IEEE transactions on neural networks"},{"key":"10.3233\/JIFS-202471_ref39","doi-asserted-by":"crossref","unstructured":"Singh M.M. , Singh A. and Mandal J.K. , A snapshot of black hole attack detection in MANET, International Journal of Computer Applications 116(14) (2015).","DOI":"10.5120\/20406-2759"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-202471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T03:56:22Z","timestamp":1770004582000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-202471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,11]]},"references-count":27,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-202471","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,11]]}}}