Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN

K Thangaramya, K Kulothungan, S Indira Gandhi… - Soft Computing, 2020 - Springer
… -based secured routing with Outlier Detection (… secure routing is employed here to perform
the secured transmission of the data collected by the sensor nodes. Moreover, in the routing

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

S Yadav, MC Trivedi, VK Singh… - 2017 4th IEEE Uttar …, 2017 - ieeexplore.ieee.org
… THE PROPOSED OUTLIER DETECTION SCHEME (ODS) In this paper, novel outlier
detection scheme is proposed to make AODV routing protocol secure against black hole attack. …

A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks

L Yang, Y Lu, SX Yang, T Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… and outlier detection scheme, respectively. In Section VII, the details of our secure clustering
… clustering protocol SCFTO with the recent trust-based secure routing or clustering protocols …

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

V Gomathy, N Padhy, D Samanta, M Sivaram… - Journal of Ambient …, 2020 - Springer
… Assume altered/unreliable readings as outliers and identify them using an … a local outlier
factor computation method. The outlier detection algorithm is used by the author (1) detection of …

[HTML][HTML] Survey on security issues of routing and anomaly detection for space information networks

M Zhuo, L Liu, S Zhou, Z Tian - Scientific Reports, 2021 - nature.com
… Then, this article selects secure routing and anomaly detection from many security … to
perform real-time outlier detection and quantify how abnormal the outliers are. The advantage of …

[HTML][HTML] A novel anomaly behavior detection scheme for mobile ad hoc networks

N Chugh, GS Tomar, RS Bhadoria, N Saxena - Electronics, 2021 - mdpi.com
outlier detection. Also, we extend Teo and Tan’s model [1] by incorporating outlier detection
methods to build a secure key … -based secure routing scheme that offers trust-based secure

Outlier detection and countermeasure for hierarchical wireless sensor networks

YY Zhang, HC Chao, M Chen, L Shu, CH Park… - IET Information Security, 2010 - IET
secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study
presents a novel outlier detectionOutliers, however, can refuse to route certain messages and …

An evolutionary game-based secure clustering protocol with fuzzy trust evaluation and outlier detection for wireless sensor networks

L Yang, Y Lu, SX Yang, Y Zhong, T Guo… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
… -based secured routing with outlier detection (FRCSROD) algorithm is proposed for secure
… a fuzzy rule and distance-based outlier detection method is presented which incorporates a …

Outlier detection in ad hoc networks using dempster-shafer theory

W Li, A Joshi - 2009 Tenth International Conference on Mobile …, 2009 - ieeexplore.ieee.org
… , such as routing, because they do not possess the proper secure credentials, … secure
credentials, and consequently can interfere with almost all of the network operations, such as route

Crowd-based detection of routing anomalies on the Internet

R Hiran, N Carlsson… - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
… As an effort to help detect routing anomalies and to push operators to implement secure
that would then perform the “collaborative” outlier detection and apply the Binomial test. This …