2015
DOI: 10.5120/21684-4786
|View full text |Cite
|
Sign up to set email alerts
|

Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET

Abstract: MANETs are much more susceptible to various attacks because of openness in network topology and being away of a centralized administration in management. As an outcome of that, more malicious nodes are often comes in and goes out without being detected from the network topology. Hence, MANET needs very specialized security methods to isolate the false entrance. As well as there is no single solution that fitting in different types of the network where the nodes can be behave like any apparatuses. The networks … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…In this sense we obtain pseudo experimental data, in contrast to the real experimental data in the underground detectors. As we adopt the same initial or boundary conditions which is applied to the real underground detectors, such as detector geometry [1], live days for the experiment [1], incident neutrino energy spectrum [2] and the interior structure of the Earth [3], we can say that our pseudo experimental data are directly comparable with the corresponding real experimental data, allowing for the uncertainties occurring in the real experiments.…”
Section: The Characteristics Of the Computer Numerical Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this sense we obtain pseudo experimental data, in contrast to the real experimental data in the underground detectors. As we adopt the same initial or boundary conditions which is applied to the real underground detectors, such as detector geometry [1], live days for the experiment [1], incident neutrino energy spectrum [2] and the interior structure of the Earth [3], we can say that our pseudo experimental data are directly comparable with the corresponding real experimental data, allowing for the uncertainties occurring in the real experiments.…”
Section: The Characteristics Of the Computer Numerical Experimentsmentioning
confidence: 99%
“…where R g is the radius of the Earth and r SK = 1−D SK /R g , D SK , is the depth of the underground 3 In our computer numerical experiments, we adopt the rejection method in Monte Carlo manner to obtain neutrino events with oscillation. 4 In our numerical experiment, we adopt ∆m 2 = 2.4 × 10 −3 eV 2 and sin 2 2θ = 1.0 [1].…”
Section: The Correlation Between L ν and L µmentioning
confidence: 99%