Development of a Hybrid DL-ML IDS for Blackhole Attack Detection in Heterogeneous IoT-EHT Networks

Authors

  • Mina Malekzadeh Electrical and Computer Engineering Faculty, Hakim Sabzevari University, Sabzevar, Iran
  • Alireza Naseri Electrical and Computer Engineering Faculty, Hakim Sabzevari University, Sabzevar, Iran

Keywords:

IoT networks, 802.11be, Deep Learning, Machine learning, Blackhole Attacks

Abstract

The heterogeneous nature of data transmission within the Internet of Things (IoT) demands efficient communication. The IEEE 802.11be standard, known as extremely high throughput (EHT), introduces advanced capabilities that can meet these demands. However, extending IoT into the EHT domain inevitably transfers existing vulnerabilities, exposing IoT–EHT networks to threats that can compromise functionality. A major threat is the blackhole attack, in which a malicious node advertises the best routing path, attracts legitimate traffic, and discards it. To detect this threat within IoT–EHT networks, we propose DML‑IDS, a hybrid intrusion detection system framework that leverages different machine learning and deep learning models. We further introduce a dataset generation method that reflects diverse IoT conditions, capturing both normal and under‑attack performance across three key features: proximity, sensor density, and payload size. These datasets are used to train the framework and to assess the attack severity. The framework is implemented to determine both network‑level and detection‑level results. Simulation outcomes reveal that sensor density and payload size are more reliable indicators of blackhole attack behavior than proximity, underscoring the importance of aligning detection architectures with feature dynamics. Moreover, the findings demonstrate consistently high reliability of ML and DL models, with ML outperforming DL across the features.

References

[1] N. Dawar, K. N. Nguyen, A. Sehgal, Y. Zhu, B. L. Ng and J. Choi, Enhancing wi fi 7: Traffic flow intelligence and multi link operation for optimal efficiency, IEEE Access, 13, 2025, 63298-63309.

[2] V. Frascolla, D. Cavalcanti and R. Shah, Wi-Fi evolution: The path towards wi-fi 7 and its impact on IIoT, IEEE Journal of Mobile Multimedia, 19(1), 2023, 1-14.

[3] R. K. Dhanaraj, L. Krishnasamy, O. Geman and D. R. Izdrui, Black hole and sink hole attack detection in wireless body area networks, Computers, Materials and Continua, 68(2), 2021, 1949-1965.

[4] H. Tyagi, R. Kumar and S. K. Pandey, Trust evaluation and prediction framework using time‑series analysis and deep learning approach during blackhole attack in internet of things (IoT), Arabian Journal for Science and Engineering, 50, 2025, 19597‑19614.

[5] G. Farahani, Black hole attack detection using k‑nearest neighbor algorithm and reputation calculation in mobile ad hoc networks, Security and Communication Networks, 2021, 8814141.

[6] M. A. Khan, R. N. B. Rais, O. Khalid and S. Ahmad, Trust-based optimized reporting for detection and prevention of black hole attacks in low-power and lossy green IoT networks, Sensors, 24, 2024, 2-22.

[7] S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. Humayun, A. O. Ibrahim and A. Abdelmaboud, A trust-based model for secure routing against RPL attacks in internet of things, Sensors, 22(18), 2022, 1-20.

[8] R. K. Dhanaraj, S. K. H. Islam and V. Rajasekar, A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments, Wireless Networks, 28, 2022, 3128–3142.

[9] Z. Hassan, A. Mehmood, C. Maple, M. A. Khan and A. Aldegheishem, Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles, IEEE Access, 8, 2020, 199618-199628.

[10] N. Yang, K. Chen and M. Wang, SmartDetour: Defending blackhole and content poisoning attacks in IoT NDN networks, IEEE Internet of Things Journal, 8(15), 2021, 12119-12136.

[11] D. K. Sharma, S. K. Dhurandher, S. Kumaram, K. D. Gupta and P. K. Sharma, Mitigation of black hole attacks in 6LoWPAN RPL-based wireless sensor network for cyber physical systems, Computer Communications, 189, 2022, 182-192.

[12] K. Sanders and S. S. Yau, An effective approach to protecting low-power and lossy IoT networks against blackhole attacks, IEEE International Conferences on Internet of Things (iThings), GreenCom, CPSCom, SmartData and Congress, Melbourne, Australia, 2021, 65-72.

[13] I. A. Reshi, S. Sholla and Z. A. Najar, Safeguarding IoT networks: Mitigating black hole attacks with an innovative defense algorithm, Journal of Engineering Research, 12, 2024, 133-139.

[14] T. A. S. Srinivas and S. S. Manivannan, Black hole and selective forwarding attack detection and prevention in IoT in health care sector: Hybrid meta-heuristic-based shortest path routing, Journal of Ambient Intelligence and Smart Environments, 13, 2021, 133-156.

[15] M. Yazdanypoo, S. Cirillo and G. Solimando, Developing a hybrid detection approach to mitigating black hole and gray hole attacks in mobile ad hoc networks, Applied Sciences, 14(17), 2024, 1-13.

[16] P. R. Kavita, S. Verma and G. N. Nguyen, Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network, IEEE Access, 8, 2020, 121755-121764.

[17] M. Shameer and L. Gnanaprasanambikai, K-means clustering-based trust (KmeansT) evaluation mechanism for detecting blackhole attacks in IoT environment, International Journal of Computing and Digital Systems, 16, 2024, 1-13.

[18] J. L. Webber, A. Arafa, A. Mehbodniya, S. Karupusamy, B. Shah, A. K. Dahiya and P. Kanani, An efficient intrusion detection framework for mitigating blackhole and sinkhole attacks in healthcare wireless sensor networks, Computers and Electrical Engineering, 111, 2023, 1-12.

[19] R. K. Dhanaraj, R. H. Jhaveri, L. Krishnasamy, G. Srivastava and P. K. R. Maddikunta, Black-hole attack mitigation in medical sensor networks using the enhanced gravitational search algorithm, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 29, 2021, 297-315.

[20] N. Panda and M. Supriya, Blackhole attack prediction in wireless sensor networks using support vector machine, Advances in Signal Processing, Embedded Systems and IoT, 992, 2023, 321-331.

[21] The ns‑3 Network Simulator. Available: https://www.nsnam.org. (Accessed: Dec. 23, 2025).

[22] Wireshark, Available: https://www.wireshark.org. (Accessed: Dec. 23, 2025).

[23] CICFlowMeter, Available: https://github.com/ahlashkari/CICFlowMeter. (Accessed: Dec. 23, 2025).

[24] Argus, Available: https://openargus.org/using-argus. (Accessed: Dec. 23, 2025).

[25] G. Sharma, J. Grover and A. Verma, Performance evaluation of mobile RPL-based IoT networks under version number attack, Computer Communications, 197, 2023, 12-22.

[26] K. J. Dong, A comprehensive analysis of routing vulnerabilities and defense strategies in IoT networks, Cryptography and Security, 2024, 1-12.

Downloads

Published

28-01-2026

How to Cite

Malekzadeh, M., & Naseri, A. (2026). Development of a Hybrid DL-ML IDS for Blackhole Attack Detection in Heterogeneous IoT-EHT Networks. Applications of Modelling and Simulation, 10, 64–77. Retrieved from https://www.ojs.arqiipubl.com/index.php/AMS_Journal/article/view/1140

Issue

Section

Articles

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.