2017
DOI: 10.1002/dac.3487
|View full text |Cite
|
Sign up to set email alerts
|

A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks

Abstract: Opportunistic networks (OppNets) are networks that can be used in situations of sparse network connectivity. Strategies for implementing secure transmission of messages in OppNets offer complex and distinctive problems that are wholly different from traditional networks using TCP/IP protocols for data transmission. In this paper, a security protocol named FuzzyPT is proposed which combats black hole attacks in OppNets. The defense mechanism is based on the information extracted from messages in the buffer, pot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…Recently, research in OppNets has also started focusing on tackling security issues, and the design of trust based mechanisms for counteracting selfish node behavior. Significant work related to energy efficiency and congestion control has also been proposed.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, research in OppNets has also started focusing on tackling security issues, and the design of trust based mechanisms for counteracting selfish node behavior. Significant work related to energy efficiency and congestion control has also been proposed.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Similarly, a decimal value is constructed for each of the M = 3 weights from every p = 5 path selections. These weights are then used in the feed forward phase to calculated error function MSE as mentioned in equation 17. The weights that give the least MSE are said to be the most optimal weights and are thereby used in Operation Phase.…”
Section: Weights Updation Phase: Iwdcomentioning
confidence: 99%
“…Therefore, if we have a network comprising of large number of nodes, then we need to define large number of rules which are impossible to create and becomes complex for the developer. Chhabra et al [7] designed a secure fuzzy potential threat protocol that utilized to fight against Blackhole attack in OppNets. In this scheme, a rank list of nodes has been created to make a decision regarding as to which node the data has to be transmitted.…”
Section: Related Workmentioning
confidence: 99%
“…The network has been used to detect malicious nodes up to 2 to 80 %, which is possible by employed fuzzy logic as a classification approach. Chhabra et al [12] have implemented a approach based on fuzzy potential Threat protocol to protect MANET from Black hole attack. The designed protocol has helped to deliver data on time with smaller packet drop.…”
Section: Detection and Prevention Of Manet Using Hybrid Svm With Annmentioning
confidence: 99%