2022
DOI: 10.1007/s00500-022-06915-1
|View full text |Cite
|
Sign up to set email alerts
|

A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 19 publications
0
22
0
Order By: Relevance
“…In [61] author proposed a method for five routing attacks which are Grayhole attack, Selective forwarding attack, Sinkhole attack , Blackhole and Wormhole attacks are covered. The purpose of this paper is to detect all above attacks by one method which is fuzzy rule and feed forward neural network, author also compared the proposed solution with traditional ML approaches such as RF, DT and SVM.…”
Section: ) Fuzzy Rule and Feed Forward Methods For Securitymentioning
confidence: 99%
“…In [61] author proposed a method for five routing attacks which are Grayhole attack, Selective forwarding attack, Sinkhole attack , Blackhole and Wormhole attacks are covered. The purpose of this paper is to detect all above attacks by one method which is fuzzy rule and feed forward neural network, author also compared the proposed solution with traditional ML approaches such as RF, DT and SVM.…”
Section: ) Fuzzy Rule and Feed Forward Methods For Securitymentioning
confidence: 99%
“…Within this scheme, the authors used a decision tree, long and short-term memory, a support vector machine, and knearest neighbor algorithms to ensure the legitimacy of an employed WSN application. Ezhilarasi et al [81] proposed a novel intrusion detection system for WSN to detect and prevent routing attacks such as hello flood attacks, sybil attacks, wormhole attacks and blackhole attacks, etc, in these networks. To continue this discussion, Raghav et al [82], proposed a bio-inspired secure routing framework for WSN applications employing bee algorithms.…”
Section: B Network Layer Counteraction Schemes Of Swsnmentioning
confidence: 99%
“…The disadvantage obtained with this approach was the deployment of an inefficient and unreliable framework of MANET. In [21] suggested an innovative probabilistic key management algorithm with the utilization of asymmetric cryptography. It was suited for a large-scale MANET.…”
Section: Related Workmentioning
confidence: 99%