[PDF][PDF] Detection of wormhole, blackhole and DDOS attack in MANET using trust estimation under fuzzy logic methodology

AK Khare, JL Rana, RC Jain - International Journal of Computer …, 2017 - mecs-press.org
Mobile ad-hoc communication is a spontaneous network because the topology is not
stationary but self-organized. This requires that during the time MANET it operational, all the …

[PDF][PDF] Trust value based algorithm to identify and defense gray-hole and black-hole attack present in MANET using clustering method

NJK Patel, K Tripathi - International Journal of Scientific Research in …, 2018 - academia.edu
ABSTRACT A Mobile ad hoc network (MANET) is infrastructure less network and has
numbers of mobile nodes. Any node can work as a router that receives and sends packets …

Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks

VH Kshirsagar, AM Kanthe, D Simunic - Wireless Personal …, 2018 - Springer
The mobile ad hoc network (MANET) is communication network of a mobile node without
any prior infrastructure of communication. The network does not have any static support; it …

A kind of new method of intelligent trust engineering metrics (ITEM) for application of mobile ad hoc network

D Zhang, C Gong, K Jiang, X Zhang… - Engineering …, 2020 - emerald.com
Purpose This paper aims to put forward a kind of new method of intelligent trust engineering
metrics for application of mobile ad hoc network (MANET). Design/methodology/approach …

Fuzzy trust approach for detecting black hole attack in mobile adhoc network

G Arulkumaran, RK Gnanamurthy - Mobile Networks and Applications, 2019 - Springer
Wireless communication technique is crucial during inaccessible disasters, military
operation and natural climate adapt. Military application required secure way of data …

Dynamic trust based method to mitigate greyhole attack in mobile adhoc networks

N Bhalaji, A Shanmugam - Procedia Engineering, 2012 - Elsevier
Effective mitigation against the security attacks in the mobile adhoc network is a challenging
job. A new routing protocol based on the trust model is proposed and analysed in this article …

Trust-based intrusion detection with secure key management integrated into MANET

K Shanthi, D Murugan… - … Security Journal: A Global …, 2018 - Taylor & Francis
In mobile ad hoc network (MANET), few nodes may be pretentious by some intrusions or
attackers. These affected nodes perform as a selfish node and necessitate more energy than …

Design and implementation of trust based approach to mitigate various attacks in mobile ad hoc network

NND Mr, RSM Mr - Procedia Computer Science, 2016 - Elsevier
A Mobile ad hoc network (MANET) is self organizing, decentralized and infrastructure less
wireless network. The successful transmission of data packet is depends on the cooperation …

Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory

H Xia, Z Jia, L Ju, Y Zhu - IET wireless sensor systems, 2011 - IET
Owing to the openness in network topology and the absence of centralised administration in
management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious …

A trusted MANET routing algorithm based on fuzzy logic

QM Yas, M Khalaf - International Conference on Applied Computing to …, 2019 - Springer
MANET wireless network changes network topology continuously and dynamically due to
the absence of infrastructure and central control. Typically, this network used for areas …