2015 International Conference on Signal Processing and Communication Engineering Systems 2015
DOI: 10.1109/spaces.2015.7058308
|View full text |Cite
|
Sign up to set email alerts
|

Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey

Abstract: Mobile ad-hoc networks hav different types of packet dropping attacks. T strong mechanism to detect these malevol classify normal and abnormal nodes as pe nodes. Machine learning techniques disting quickly and accurately provide classificat behavior of those nodes in the network. In th various machine learning techniques as network, support vector machine, decision Bayesian network for identifying the malic techniques are able to detect black hole, g attacks and other packet dropping attack misbehaving nodes a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…As controllers are independent of each other and eNB is not involved in any traffic exchange, we call it a distributed approach. Our scenario is the case of multiple agents with multiple actions; therefore, we use Multi-Agent Reinforcement Learning (MARL) algorithm to solve it [157,158]. There are two distinct ways in which Q-learning could be applied to a multi-agent system.…”
Section: Distributed Slot Allocationmentioning
confidence: 99%
“…As controllers are independent of each other and eNB is not involved in any traffic exchange, we call it a distributed approach. Our scenario is the case of multiple agents with multiple actions; therefore, we use Multi-Agent Reinforcement Learning (MARL) algorithm to solve it [157,158]. There are two distinct ways in which Q-learning could be applied to a multi-agent system.…”
Section: Distributed Slot Allocationmentioning
confidence: 99%
“…Security properties play a key role in any distributed systems such as military infrastructure, banking, e-commerce, safety-critical autonomous systems, mobile ad-hoc and more [140]. Many analysis and modeling techniques have been proposed to make sure the correctness of the security protocol.…”
Section: Testing Security Propertiesmentioning
confidence: 99%
“…Meenakshi patel et al [5] [13] proposed as, detecting malicious attacks happing in AODV rule of conduct. Misbehavior as environmental factor, movement speed and communication range these types of misbehaving pattern detecting and classify them with SVM method of supervised learning method of machine learning.…”
Section: Related Workmentioning
confidence: 99%
“…MANET is a wireless and decentralized network [13] [19]. MANET routing depends on routing rules of conduct that divides into three categories: proactive, reactive and hybrid [17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation