• Corpus ID: 6774161

An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy

@inproceedings{Anusha2013AnEA,
  title={An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy},
  author={K. Anusha and N Jayaleshwari and S. Arunkumar and G. V. Rajyalakshmi},
  year={2013}
}
Mobile ad-hoc Network is a self organized wireless network which has a dynamic topology where nodes can be join or leave the network at anytime with large number of nodes. Due to its infrastructure less, dynamic topology and lack of centralization it is vulnerable to many security attacks. In this paper, we propose to detect the attack by using an Intrusion detection system that uses intuitionistic fuzzy logic which aims to detect distrust behavior of node and identify the attacks if it seems… 

Figures and Tables from this paper

Intrusion Detection Methods in MANET: A Survey

TLDR
In this paper an attempt has been made to compare traditional intrusion detection techniques with modern approaches used for intrusion detection.

Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET

TLDR
The uniqueness of this paper is that it presents a state-of-art study of existing survey papers and potentially emphasized on techniques for detection and prevention of wormhole attack in MANET.

Ensemble of Ada Booster with SVM Classifier for Anomaly Intrusion Detection in Wireless Ad Hoc Network

TLDR
The EAB-SVM technique achieved the better performance in terms of packet delivery ratio, classification time, false positive rate and anomaly intrusion detection accuracy compared to state-of-the-art methods.

Fuzzy Logic Tool for Imprecise Information in Wireless Communication- Another Perspective

TLDR
This paper will focus on application of fuzzy logic in cognitive radio, wireless sensor networks, decision making in heterogeneous wireless environment, routing in mobile Ad-hoc networks etc.

References

SHOWING 1-10 OF 20 REFERENCES

A Fuzzy Based Approach to Detect Black hole Attack

TLDR
A fuzzy based decision to check a node is infected by Black hole attack or node is presented and the proposed system will identify the attack over the node as well as provide the solution to reduce the data loss over the network.

Intrusion detection of in-band wormholes in MANETs using advanced statistical methods

TLDR
This work proposes detection schemes that are suitable to detect in-band wormhole attacks and introduces non-parametric methods, which require no training and are more adaptive to mobile scenarios.

Threat Modelling for Mobile Ad Hoc and Sensor Networks

TLDR
This paper indicates components that can be used to form an adversary model for sensor networks and mobile ad hoc networks (MANETS) and identifies threat categories, modes of use, and a variety of threats to the systems assets including: threats to communications, threat to infrastructure services, threats to individual nodes, and threats concerning the human element.

Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

TLDR
A new intelligent agent-based intrusion detection model for mobile ad hoc networks is proposed using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods to detect intrusions in networks effectively.

Intuitionistic fuzzy sets

Intuitionistic Fuzzy Sets in some Medical Applications

For many real world problems, imperfect, imprecise information is, by nature, part of the problem itself and continuing reasoning without proper modelling tools may led to generating inaccurate

Ontology for MANET security threats", PROC. NCON, Krishnankoil, Tamil Nadu, Mar

  • 2005

Ad-hoc On-Demand Vector Routing

  • In Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications;
  • 1999

Energy based trust solution for detecting selfish nodes in MANET using fuzzy logic

  • International journal of research and review in computer science,
  • 2011

Fuzzy Sets & Fuzzy Logic