Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule

N Veeraiah, BT Krishna - Wireless Networks, 2019 - Springer
The dynamic nature of the nodes on the mobile ad hoc network (MANET) imposes security
issues in the network and most of the Intrusion detection methods concentrated on the …

IDMTM: A novel intrusion detection mechanism based on trust model for ad hoc networks

F Wang, C Huang, J Zhao… - … Conference on Advanced …, 2008 - ieeexplore.ieee.org
An Ad hoc network is the cooperative engagement of a collection of mobile nodes without
the required intervention of any centralized access point or existing infrastructure, so they …

A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET)

G Indirani, K Selvakumar - International Journal of Parallel …, 2014 - Taylor & Francis
In mobile ad hoc network (MANET), the issues such as limited bandwidth availability,
dynamic connectivity and so on cause the process of intrusion detection to be more …

Performance analysis of malicious node detection in MANET using ANFIS classification approach

A Kumaravel, M Chandrasekaran - Cluster Computing, 2019 - Springer
Security threaten is the primary issue in mobile ad hoc networks (MANET). The efficiency of
the MANET system is affected by presence of malicious nodes. It is very difficult task to …

A trust-based secure neuro fuzzy clustering technique for mobile ad hoc networks

AR Rajeswari, WC Lai, C Kavitha… - Electronics, 2023 - mdpi.com
A MANET consists of a group of mobile nodes. In a MANET, scalability and mobility have a
greater influence on routing performance. The clustering technique plays a vital role in …

Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory

H Xia, Z Jia, L Ju, Y Zhu - IET wireless sensor systems, 2011 - IET
Owing to the openness in network topology and the absence of centralised administration in
management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious …

[PDF][PDF] Detection of wormhole, blackhole and DDOS attack in MANET using trust estimation under fuzzy logic methodology

AK Khare, JL Rana, RC Jain - International Journal of Computer …, 2017 - mecs-press.org
Mobile ad-hoc communication is a spontaneous network because the topology is not
stationary but self-organized. This requires that during the time MANET it operational, all the …

[PDF][PDF] A distributed cooperative trust based intrusion detection framework for MANETs

S Mutlu, G Yilmaz - ICNS, 2011 - personales.upv.es
Mobile Ad Hoc Network (MANET) is a collection of nodes, which form an infastructureless
topology. There is no central access point or centralized management. For their nature …

TBCS: A trust based clustering scheme for secure communication in flying ad-hoc networks

K Singh, AK Verma - Wireless Personal Communications, 2020 - Springer
Abstract In Flying Ad hoc Networks (FANETs), coordination and cooperation among nodes
are important for efficient data transmission. Cooperation among the nodes hinges on the …

[PDF][PDF] Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks

A Chaudhary, VN Tiwari, A Kumar - BVICA M's International Journal of …, 2014 - bvicam.in
Due to the advancement in wireless technologies, many of new paradigms have opened for
communications. Among these technologies, mobile ad hoc networks play a prominent role …