2019
DOI: 10.4108/eai.13-7-2018.160834
|View full text |Cite
|
Sign up to set email alerts
|

Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications

Abstract: INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of Things (IoT) in many application cases due to its flexibility and scalability. The dynamic nature of MANET introduces some security threats in IoT environment. In those threats, Blackhole attack and Grayhole attack are severe routing attacks that disrupts routing algorithm to crack transmission in the entire network. OBJECTIVES: Many security mechanisms are introduced in MANET based on trust computation schemes. However, computation of i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…(2). [25] c) (3). [24] d) MDR= and FAR= (4) where N f is the number of false packets, which is recognized as true packets, N i is the total number of packets and N mis is the number of true packets, which is recognized as false packets and N is the number of true packets.…”
Section: Resultsmentioning
confidence: 99%
“…(2). [25] c) (3). [24] d) MDR= and FAR= (4) where N f is the number of false packets, which is recognized as true packets, N i is the total number of packets and N mis is the number of true packets, which is recognized as false packets and N is the number of true packets.…”
Section: Resultsmentioning
confidence: 99%
“…For any V i , j ∈ C k , if d i j < 2R and T rri > T ′ rri . The node j is determined to be the cooperative node of the network attack, and i is the attacking node of the network; otherwise, if the node is not identified as the above-mentioned attacking node, the node is a normal node [28,29].…”
Section: ) Intrusion Detection Partmentioning
confidence: 99%
“…MANET is susceptible to security attacks like greyhole attack, Sybil attack, blackhole attack, jamming attack, rushing attack. These attacks decrease the performance of the full network [8].…”
Section: Introductionmentioning
confidence: 99%