Proceedings of the 8th International Conference on Bio-Inspired Information and Communications Technologies (Formerly BIONETICS 2015
DOI: 10.4108/icst.bict.2014.258041
|View full text |Cite
|
Sign up to set email alerts
|

Social Insect-based Sybil Attack Detection in Mobile Ad-hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…They have already been applied successfully in different network contexts such as data routing and distribution [?, 11]. Furthermore, based on the interesting phenomena of ants' behaviors, ant colony inspired security mechanisms can be derived [12]. In nature, each ant has a Cuticular Hydrocarbon (CHC) profile in which diverse information about the ant itself and its environment can be encoded [13,4].…”
Section: Biological Backgroundmentioning
confidence: 99%
“…They have already been applied successfully in different network contexts such as data routing and distribution [?, 11]. Furthermore, based on the interesting phenomena of ants' behaviors, ant colony inspired security mechanisms can be derived [12]. In nature, each ant has a Cuticular Hydrocarbon (CHC) profile in which diverse information about the ant itself and its environment can be encoded [13,4].…”
Section: Biological Backgroundmentioning
confidence: 99%
“…The point that classifies nodes into honest and attacker classes which is most matched to the real attacker/honest nodes in the network, is considered as the best cutoff point. Nodes with dissimilar behavior classified in different groups and lead to have more aggression/distrust toward each other [2]. In the learning phase, 360 scenarios were performed in QualNet.…”
Section: Learning Phase 31 Similarity Nodes' Behaviormentioning
confidence: 99%
“…Generally in a self-organized networks system each individual needs a learning phase to verify the certificates, as there is no central certificate authority. In this work we focus on investigating the learning phase of a bioinspired authentication mechanism [2].…”
Section: Introductionmentioning
confidence: 99%