2017
DOI: 10.5815/ijcnis.2017.07.04
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology

Abstract: Abstract-Mobile ad-hoc communication is a spontaneous network because the topology is not stationary but self-organized. This requires that during the time MANET it operational, all the processes regarding discovering the topology, delivery of data packets and internal management communications must be taken care by the node(s) themselves. This implies the criteria for selection of Cluster Head (CH) and the routing related protocols are to be integrated into mobile node(s).The very facts that MANET is challeng… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Accordingly, DDoS attack detection technology solutions are required to be well adapted and have relatively low system resources and occupation when deployed. Based on the above considerations, it is feasible to construct a multi-agent system based solution to accomplish DDoS attack detection [8][9][10].…”
Section: Multi-agent-based Ddos Attack Detection Methodsmentioning
confidence: 99%
“…Accordingly, DDoS attack detection technology solutions are required to be well adapted and have relatively low system resources and occupation when deployed. Based on the above considerations, it is feasible to construct a multi-agent system based solution to accomplish DDoS attack detection [8][9][10].…”
Section: Multi-agent-based Ddos Attack Detection Methodsmentioning
confidence: 99%
“…The Fuzzy logic methodology [17] uses the AODV protocol to evaluate different kinds of attacks. Among the attacks, the DDoS attack is identified, based on the transfer speed of data packets, loss of data packets and the delivery ratio.…”
Section: Related Workmentioning
confidence: 99%
“…The victim device acts as an attacker and can infect another device. In many mobile networks, this type of attack targets the routing protocols to break routes between nodes in mobile ad hoc network (MANET) networks [18].…”
Section: ) Distributed Denial Of Service(ddos)mentioning
confidence: 99%