A trust-based secure neuro fuzzy clustering technique for mobile ad hoc networks

AR Rajeswari, WC Lai, C Kavitha… - Electronics, 2023 - mdpi.com
A MANET consists of a group of mobile nodes. In a MANET, scalability and mobility have a
greater influence on routing performance. The clustering technique plays a vital role in …

An efficient trust‐based secure energy‐aware clustering to mitigate trust distortion attack in mobile ad‐hoc network

AR Rajeswari, S Ganapathy… - Concurrency and …, 2021 - Wiley Online Library
Trust‐aware clustering plays a vital role in addressing the security issues faced by mobile ad‐
hoc networks (MANETs). The trust worthiness of each participated node is to be estimated …

TBCS: A trust based clustering scheme for secure communication in flying ad-hoc networks

K Singh, AK Verma - Wireless personal communications, 2020 - Springer
Abstract In Flying Ad hoc Networks (FANETs), coordination and cooperation among nodes
are important for efficient data transmission. Cooperation among the nodes hinges on the …

[PDF][PDF] Trust-based clustering in mobile ad hoc networks: Challenges and issues

I Neyshabur, I Branch - International Journal of Security and Its …, 2013 - academia.edu
Mobile ad hoc networks are prone to various security attacks of malicious nodes and
attackers. To protect the network clustering from security attacks, numerous trust-based …

Type II fuzzy-based clustering with improved ant colony optimization-based routing (t2fcatr) protocol for secured data transmission in manet

M Nagendranth, MR Khanna, N Krishnaraj… - The Journal of …, 2022 - Springer
Mobile ad hoc networks (MANETs) include a collection of distinct and autonomous nodes
that move independently and send data using wireless channels. Clustering and secure …

[PDF][PDF] Optimizing on demand weight-based clustering using trust model for mobile ad hoc networks

VG Rani, M Punithavelli - International Journal of Ad hoc, Sensor & …, 2010 - academia.edu
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the …

Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN

R Das, M Dwivedi - Journal of Reliable Intelligent Environments, 2024 - Springer
The widespread use of hierarchical wireless sensor networks (HWSN) in various industries,
including environmental monitoring, healthcare, and intrusion detection, has made the …

An optimal trust aware cluster based routing protocol using fuzzy based trust inference model and improved evolutionary particle swarm optimization in WBANs

RA Isabel, E Baburaj - Wireless Personal Communications, 2018 - Springer
The wireless body sensor network (WBSN) an extensive of WSN is in charge for the
detection of patient's health concerned data. This monitored health data are essential to be …

A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network

M Rao, P Chaudhary, K Sheoran, G Dhand - Peer-to-Peer Networking and …, 2023 - Springer
Mobile ad hoc networks (MANETs) are autonomous networks where mobile nodes are
connected with one another over wireless links using multi-hop transmission. Malicious …

Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule

N Veeraiah, BT Krishna - Wireless Networks, 2019 - Springer
The dynamic nature of the nodes on the mobile ad hoc network (MANET) imposes security
issues in the network and most of the Intrusion detection methods concentrated on the …