Fuzzy based intrusion detection systems in MANET

EV Balan, MK Priyan, C Gokulnath, GU Devi - Procedia Computer Science, 2015 - Elsevier
Mobile adhoc network (MANET) is an infrastructure less wireless network and self-
organized. During communication mobile adhoc network do not use any proper …

[PDF][PDF] Intrusion detection systems for the availability attacks in ad-hoc networks

N Shah, S Valiveti - International Journal of Electronics and Computer …, 2012 - Citeseer
Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing
topology, absence of conventional security infrastructures, vulnerability of nodes and …

[PDF][PDF] An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy

K Anusha, N Jayaleshwari, S Arun Kumar… - International Journal of …, 2013 - Citeseer
Mobile ad-hoc Network is a self organized wireless network which has a dynamic topology
where nodes can be join or leave the network at anytime with large number of nodes. Due to …

[PDF][PDF] Investigation on Routing Protocols in Wireless Ad-Hoc Networks under Security Attacks

IR Saidu - researchgate.net
Wireless networks have certainly been a revolution in today's technologically as one of the
most vital and active fields in the communication industries. These wireless ad-hoc networks …

[PDF][PDF] METRIC-BASED APPROACH TO EVALUATING ROUTING PROTOCOLS IN WIRELESS AD-HOC NETWORKS UNDER SECURITY ATTACKS

IR Saidu, MZ Haruna, IM Anka - fud.edu.ng
Abstract ireless networks certainly have been a revolution in today's technology as one of
the most vital and active fields in the communication industries. These wireless ad-hoc …

[PDF][PDF] Year of Publication: 2016

AS Baath, A Grover - 2016 - academia.edu
In this paper the effect on Zigbee mesh topology is analyzed by moving the nodes at
different trajectories at different speed. The nodes are moved by using Helbert Space-filling …

[PDF][PDF] A New Secure Fuzzy Logic based Black Hole Attack Prevention System in MANET

I Nath - International Journal of Computer Applications, 2016 - academia.edu
MANETs are accessible to various attacks [1]. Black hole attack is one kind of routing
disturbing attacks [13] and can destroy a MANET partially or totally. In this paper Fuzzy Logic …

Research on Innovating and Applying Fuzzy Logic for Routing Technique in Service Oriented Routing

NT Long, ND Thuy, PH Hoang - Internet of Things and Cloud …, 2015 - ajartdes.org
Abstract Mobile Ad-hoc Network (Manet) consists of a set of network nodes which change,
not based on an existing network infrastructure as well as the centralized control. Network …

Approaches for the Detection and Prevention of Black Hole Attack in AODV: A Critical Review

E Gupta, A Tiwari - Technia, 2014 - search.proquest.com
In the modern age, wireless network playing a very significant role for the fulfillment of
personal, private and business communication needs. Furthermore, due to fast …

[HTML][HTML] EVALUATION OF INTRUSION DETECTION TECHNIQUES IN MOBILE AD-HOC NETWORKS

A KARTHIKEYAN, S SARKAR… - Journal of Theoretical …, 2013 - jatit.org
Mobile ad-hoc networks are improvised wireless network increasingly appearing in recent
years as portable wireless devices. Due to remarkable characteristics such as lack of central …