期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET
1
作者 S.Maheswari R.Vijayabhasker 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3677-3692,共16页
Mobile Ad-hoc Networks(MANET)usage across the globe is increas-ing by the day.Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes... Mobile Ad-hoc Networks(MANET)usage across the globe is increas-ing by the day.Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes.The trust values are estimated based on the reputation values of each node in the network by using different mechanisms.However,these mechanisms have various challenging issues which degrade the network performance.Hence,a novel Quality of Service(QoS)Trust Estimation with Black/Gray hole Attack Detection approach is proposed in this research work.Initially,the QoS-based trust estimation is proposed by using a Fuzzy logic scheme.The trust value of each node is estimated by using each node’s reputation values which are deter-mined based on the fuzzy membership function values and utilizing QoS para-meters such as residual energy,bandwidth,node mobility,and reliability.This mechanism prevents only the black hole attack in the network during transmis-sion.But,the gray hole attacks are not identified which in turn increases the pack-et drop rate significantly.Hence,the gray hole attack is also detected based on the Kullback-Leibler(KL)divergence method used for estimating the statistical mea-sures.Additional QoS metrics are considered to prevent the gray hole attack,such as packet loss,packet delivery ratio,and delay for each node.Thus,the proposed mechanism prevents both black hole and gray hole attacks simultaneously.Final-ly,the simulation results show that the effectiveness of the proposed mechanism compared with the other trust-aware routing protocols in MANET. 展开更多
关键词 Mobile ad-hoc network trust estimation blackhole grayhole attack fuzzy logic qos parameters kullback-leibler divergence
在线阅读 下载PDF
Tethered UAV-active defense against intelligent cluster
2
作者 Yawei Ren Yang Zeng Jun Li 《International Journal of Intelligent Computing and Cybernetics》 2025年第3期487-501,共15页
Purpose-With the development of wireless networks and artificial intelligence technology,unmanned aerial vehicle(UAV)clusters are widely used in various fields and cluster intelligence attacks are more harmful.However... Purpose-With the development of wireless networks and artificial intelligence technology,unmanned aerial vehicle(UAV)clusters are widely used in various fields and cluster intelligence attacks are more harmful.However,most methods defending against UAV clusters produce consumption of non-reusable resources.To address this problem,a tethered UAV is adopted to perform active defense against adversary UAV clusters in this article,which can reduce the consumption of nonreusable resources.Design/methodology/approach-Using tethered UAV to enter the opponent’s UAV cluster and analyze the flow of packets in adversary UAV cluster to find and occupy the central node.The tethered UAV can acquire and analyze key packets by deploying a grayhole attack at the location of the central node,after which the packets are selectively tampered with and discarded to cripple the opposing UAV cluster.Findings-Comparing packet loss rate and delay with a normal network and the network that suffered from grayhole attack,it can be seen that the proposed scheme makes the tethered UAV close to the normal nodes in the UAV cluster and difficult to be detected.In addition,the tethered UAV is able to capture more packets compared to the other two networks,and the average deviation of the tethered UAV in capturing packets is around 5%in repeated experiments.Originality/value-This article proposes an active defense method assisted by tethered UAV,which can minimize the consumption of nonreusable resources.The tethered UAV is converged to ordinary nodes of the opponent’s cluster,in which it is not easily detected.It provides a new direction for point-air defense technology. 展开更多
关键词 Tethered UAV Active defense grayhole attack UAV cluster
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部