An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique

S Shamshirband, NB Anuar, MLM Kiah… - Engineering Applications of …, 2013 - Elsevier
The deployment of wireless sensor networks and mobile ad-hoc networks in applications
such as emergency services, warfare and health monitoring poses the threat of various …

A collaborative defense protocol against collaborative attacks in wireless mesh networks

IDJ Jingle, PM Paul - International Journal of Enterprise …, 2021 - inderscienceonline.com
Wireless mesh network is an evolving next generation multi-hop broadband wireless
technology. Collaborative attacks are more severe at the transport layer of such networks …

Reputation revision method for selecting cloud services based on prior knowledge and a market mechanism

Q Wu, X Zhang, M Zhang, Y Lou… - The Scientific World …, 2014 - Wiley Online Library
The trust levels of cloud services should be evaluated to ensure their reliability. The
effectiveness of these evaluations has major effects on user satisfaction, which is …

Machine learning and its use in e-commerce and e-business

M Rath - Handbook of research on applications and …, 2020 - igi-global.com
Electronic commerce associated with highly powerful web technology and mobile
communication is currently dominating the business world. Current advancements in …

RTT based wormhole detection using NS-3

N Agrawal, N Mishra - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Battery driven devices are need more routing strategy and their caring to safe against attack.
WSN is also vulnerable to attack like wormhole, in which a malicious node captures packets …

Wireless mesh network security, architecture, and protocols

SK Gupta, AR Wani, S Kumar, A Srivastava… - Security and Privacy …, 2020 - igi-global.com
Due to suppression of central administration in WMN, network functioning like network
controls, management, routing, switching, packet forwarding etc. are distributed among …

A trust and reputation system for energy optimization in cloud data centers

I Aransay, M Zapater, P Arroba… - 2015 IEEE 8th …, 2015 - ieeexplore.ieee.org
The increasing success of Cloud Computing applications and online services has
contributed to the unsustainability of data center facilities in terms of energy consumption …

A state-of-the-art survey on IDS for mobile ad-hoc networks and wireless mesh networks

N Deb, M Chakraborty, N Chaki - … 2011, Tirunelveli, India, September 23-25 …, 2011 - Springer
Abstract An Intrusion Detection System (IDS) detects malicious and selfish nodes in a
network. Ad hoc networks are often secured by using either intrusion detection or by secure …

Bio-inspired enhancement of reputation systems for intelligent environments

Z Banković, D Fraga, JM Moya, JC Vallejo… - Information …, 2013 - Elsevier
Providing security to the emerging field of ambient intelligence will be difficult if we rely only
on existing techniques, given their dynamic and heterogeneous nature. Moreover, security …

GoNe: Dealing with node behavior

S Sicari, A Rizzardi, LA Grieco… - 2015 IEEE 5th …, 2015 - ieeexplore.ieee.org
The detection of malicious nodes still represents a challenging task in wireless sensor
networks. This issue is particularly relevant in data sensitive services. In this work a novel …