Microservices in Big Data Analytics 2019
DOI: 10.1007/978-981-15-0128-9_15
|View full text |Cite
|
Sign up to set email alerts
|

A Fuzzy Logic-Based Control System for Detection and Mitigation of Blackhole Attack in Vehicular Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…It is plainly evident that the majority of the comparable photos have been properly searched, but the images with differing contrast values are separated by a greater distance than the other images. An image with high contrast has more edges than a low contrast image, which accounts for this [32]. The plot between the pictures and the parametric distance is depicted in Figure 14 (right).…”
Section: Search Results For Color Histogram Featurementioning
confidence: 92%
“…It is plainly evident that the majority of the comparable photos have been properly searched, but the images with differing contrast values are separated by a greater distance than the other images. An image with high contrast has more edges than a low contrast image, which accounts for this [32]. The plot between the pictures and the parametric distance is depicted in Figure 14 (right).…”
Section: Search Results For Color Histogram Featurementioning
confidence: 92%
“…Fuzzy logic focuses on representing the imprecision of human reasoning for decision making in an imprecise and uncertain environment [95]. In this subsection, trust management models employing fuzzy logic have been presented in detail [96][97][98][99][100]. Guleng et al [96] presented a decentralized trust management framework that employs fuzzy logic to amalgamate a vehicle's direct experience and the recommendations of its peers towards a target vehicle in order to tag the unintended dishonest behavior of the said target vehicle.…”
Section: Fuzzy Logic-based Trust Modelsmentioning
confidence: 99%
“…Kumar et al [98] amalgamated the notions of fuzzy logic and trust to select the best path between two nodes and to identify blackhole attacks. The relationship of vehicles is estimated using trust computations, wherein the proportion of the successfully forwarded messages by the neighbor from the number of messages this neighbor is expected to forward, the ratio of the number of messages received through the neighbor but generated by other nodes to the total count of received messages, and the acknowledgment of the message receipt are aggregated.…”
Section: Fuzzy Logic-based Trust Modelsmentioning
confidence: 99%
“…The way in which the measure of confidence is generated, allows us to divide the strategies, structures that contain the actions to be developed, into the types mentioned below we will mention the main characteristics [20] of each types: a) Cluster: This trust scheme uses authentication by means of public keys in the evaluation of a node, these are grouped into clusters which allows a group of nodes to monitor the activity of the equipment directly, the nodes certify the trust of a computer which can be verified with the use of the key and a certificate issued by each neighbour, the nodes which issue trust certificates [21,22] which do not coincide with the evaluation of the Cluster would be considered "malicious" nodes and would lose the possibility of participating in the network [23,24]. b) Social networks: Model based on four components on each computer; Monitor that detects unusual behaviour in the nodes, reputation system that allows the nodes to be qualified acording to their routing or data transmission actions, route manager in charge of selecting the routes they present, and a trusted manager that alerts to the so-called malicious nodes.…”
Section: Trusted Modelsmentioning
confidence: 99%