2023
DOI: 10.32604/iasc.2023.031422
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET

Abstract: Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day. Evaluating a node's trust value has significant advantages since such network applications only run efficiently by involving trustable nodes. The trust values are estimated based on the reputation values of each node in the network by using different mechanisms. However, these mechanisms have various challenging issues which degrade the network performance. Hence, a novel Quality of Service (QoS) Trust Estimation with Black/Gray ho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 37 publications
(39 reference statements)
0
1
0
Order By: Relevance
“…Along with spider monkey optimization and swarm Intelligence technique proposed by the study [19] to detect the black hole attackers and proved the result performs better performance. Fuzzy logic scheme based black hole and gray hole attack detection method proposed by the study [20] and simulation results achieved greater performance improvement. This research work could be achieved by adding techniques called Watch Dog to monitor the forwarding time of each packet on every node which participates in the communication.…”
Section: Introductionmentioning
confidence: 85%
“…Along with spider monkey optimization and swarm Intelligence technique proposed by the study [19] to detect the black hole attackers and proved the result performs better performance. Fuzzy logic scheme based black hole and gray hole attack detection method proposed by the study [20] and simulation results achieved greater performance improvement. This research work could be achieved by adding techniques called Watch Dog to monitor the forwarding time of each packet on every node which participates in the communication.…”
Section: Introductionmentioning
confidence: 85%