2017
DOI: 10.1007/978-981-10-5508-9_4
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…In adhoc networks, Blackhole attack detection was performed by fuzzy based trust value computation [15]. Trust value of each node was computed in fuzzy approach based on following metrics: packet delivery ratio, percentage of energy exhaustion, percentage of buffer utilization, and number of connection requests given by a node.…”
Section: Survey On Attack Detection Methodsmentioning
confidence: 99%
“…In adhoc networks, Blackhole attack detection was performed by fuzzy based trust value computation [15]. Trust value of each node was computed in fuzzy approach based on following metrics: packet delivery ratio, percentage of energy exhaustion, percentage of buffer utilization, and number of connection requests given by a node.…”
Section: Survey On Attack Detection Methodsmentioning
confidence: 99%
“…In the QoS parameters some variations have been occurred that can be showed the performance of network, mainly decreased in the presence of a black hole attack. Jain et al [11] have explored a network using fuzzy based model. The model has been utilized for the detection of black hole attack through consuming AODV along with Fuzzy based approach.…”
Section: Detection and Prevention Of Manet Using Hybrid Svm With Annmentioning
confidence: 99%
“…Each target can be reflected by some measured value, such as security, which refers to the prevention of unauthorized access to a system. Unauthorized access can be detected according to the number of illegal connections and scanning of important ports [42][43][44][45][46]. Reliability refers to the provision of a trusted service for a given duration and can be evaluated by average response time and average task success ratio.…”
Section: Introductionmentioning
confidence: 99%