2024
DOI: 10.1007/s40747-024-01348-9
|View full text |Cite
|
Sign up to set email alerts
|

SCFS-securing flying ad hoc network using cluster-based trusted fuzzy scheme

Shikha Gupta,
Neetu Sharma

Abstract: Flying Ad hoc Networks have emerged as a promising technology for number of real-time applications. However, the flexible and unstructured characteristics of these networks make them vulnerable to security threats posed by malicious nodes, such as denial of service attacks, node impersonation, and information breaches. Another major issue is the consideration of those nodes being unable to prove their trustworthiness due to factors like hardware or software failure, or by link interruptions, during the process… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…Calculating loss: The difference between the predicted output, O ′ , and the actual output, O, is computed using a mean squared error loss function (G) for learning loss computation and defined below in Equation (14).…”
Section: Weight Configuration Learning Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Calculating loss: The difference between the predicted output, O ′ , and the actual output, O, is computed using a mean squared error loss function (G) for learning loss computation and defined below in Equation (14).…”
Section: Weight Configuration Learning Modelmentioning
confidence: 99%
“…This innovative approach orchestrates a collective of agents, represented as 'monkeys', operating collaboratively to explore and navigate through a defined search space with the aim of uncovering the most optimal solution [13]. A trust-based, cluster-oriented approach, SCSF covers the aspect of node isolation techniques from mobility-based ad hoc networks to solve real-life optimization issues that are NP-hard problems as well [14].…”
Section: Introductionmentioning
confidence: 99%