Improving Network Security Based on Trust-Aware Routing Protocols Using Long Short-Term Memory-Queuing Segment-Routing Algorithms

Improving Network Security Based on Trust-Aware Routing Protocols Using Long Short-Term Memory-Queuing Segment-Routing Algorithms

Muthukumaran V., V. Vinoth Kumar, Rose Bindu Joseph, Meram Munirathanam, Balajee Jeyakumar
Copyright: © 2021 |Pages: 14
DOI: 10.4018/IJITPM.2021100105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Defending all single connection failures for a particular system, segment routing issue, the switch will focus on the problems of selecting a small subset of trust-aware routing to improve the deep learning (DL). In the end, even if there were multiple path failures, these paths may introduce long-term, unnecessary overload in the proposed long short-term memory networks-based queuing routing segmentation (LSTM-QRS) experience of reducing traffic delays and adjusting traffic length by reducing network bandwidth. The critical factor is a novel traffic repair technique used to create a traffic repair path that switches to software-defined network (SDN) using multiple routing and providing additional flexibility in re-routing using long short-term memory networks (LSTM)-based queuing routing segment (LSTM-QRS) algorithms. It reduces the repair path length and recommends replacing the target-based traffic with the connection-based traffic fault detection router to avoid targeted traffic network congestion.
Article Preview
Top

1. Introduction

The Trust uses the Distributed Trust Model Energy Trust and Energy Routing Protocol (TERP) to detect and isolate faulty nodes. TERP integrates a complex routing process involving the hop number of adjacent terminals to guide Trust, residual power, and results. This versatile routing strategy enables reliable data balance, balancing power consumption using short paths of path data. Also, the smart TERP thereby calculates the actual connection distance, avoiding unnecessary route detection. Simulation results show that the performance, network and stability of the TERP approach are improved. Software-Defined Network (SDN) ensures a centralized, Flexible computer network, scheduling control. Typical Software-Defined Network (SDN), logic centralized controller network package policies (e.g., routing, access control, path traffic) within the forwarding rules, and installs them via control channels (e.g., open Segment switches. Although Software-Defined Network (SDN) offers many advantages that traditional networks do not, it raises new security issues.

First, the Software-Defined Network (SDN) switch operating system is vulnerable. For example, a recent study on packets switching with an attacker invariably compromises the switch operating system's load control of the Software-Defined Network (SDN). Second, the control footprint between the controller and the switch does not provide further protection. Even though OpenSegment recommends using standard, most Software-Defined Network (SDN) switch vendors go with this feature. As mentioned earlier, the security loopholes open the door often call the Software-Defined Network (SDN) community's regime change attack, which avoids the threat carrier. In the case of a rule change attack on the control channel, the adversary switch OS can be compromised or acted upon to amend the rules established with a man's middle controllers. Therefore, the packet can deviate from the original path and override the unique network. For example, a state must pass through a specific firewall, and if an attacker can remove the rule, all packages belong to the firewall bypass the Segment option. Due to the regime change attack, the SDN is invincible in open ring control: the controller only installs the switch rules, but it cannot guarantee that they are killing the switch. Although Software-Defined Network (SDN) has many validation tools, often intended to validate the network. The controller may assume that the switch is trusted. As a result, it can input the switch and make the environment work as a host. Also, the quality of access ways, a certain degree of confidence, even if the concept model of energy costs, remote nodes neighboring sink, or hop on a safe path for evaluating factors, including distances.

Software-Defined Network (SDN) is an emerging network model that greatly simplifies network management tasks. It also opens a network of flexible control gateways that operate through the network's project system interface. On the other hand, traditional Trust aware routing protocols have been known for decades to introduce new functions, making errors difficult to manage. Open research challenges this new technology to introduce concepts and Software-Defined Network (SDN) applications. Traditional Trust aware routing protocol design uses a shared control architecture. Each device must negotiate the correct network's character in terms of communication and configuration with each other through a large set of network devices. Sell ​​different protocol parameters such that closed elements and network administrators can change the network tools. All administrators and network-scripts need to translate high-level network policies, often referred to as “configuration languages.” Also, each equipment manufacturer has its structure.

To protect the sensor network from malicious nodes, routing attacks will always be a challenge. A Foundation Awareness Distance Vector Routing Protocol protects wireless sensor networks from a trust aware distance vector routing protocol. Our proposed method has proven to improve network performance based on target data packet transmission rate end-to-end delay and multiple nodes through experimental results. Foundation concept model, which is first proposed at the start of the electronic, reliable identifiers, competent identification Detect exposed nodes in the network because the terminal's trust rating will link to Data of past suspicious node behavior and reliable neighbor reference. Based on this rationale, a trust-based steering strategy is proposed to strengthen network security further. During the relevant strategic design phase, the first consideration is how to select a safe way to improve the intermediate node in light of the confidence value.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 3 Released, 1 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing