Performance analysis of malicious node detection in MANET using ANFIS classification approach

被引:0
|
作者
A. Kumaravel
M. Chandrasekaran
机构
[1] Paavai Engineering College,Department of Electronics and Communication Engineering
[2] GCE,Department of Electronics and Communication Engineering
来源
Cluster Computing | 2019年 / 22卷
关键词
Security; Malicious nodes; Trusty nodes; Features; Classifier;
D O I
暂无
中图分类号
学科分类号
摘要
Security threaten is the primary issue in mobile ad hoc networks (MANET). The efficiency of the MANET system is affected by presence of malicious nodes. It is very difficult task to identify the malicious nodes from the trusty nodes in MANET system due to similar characteristics between malicious and trusty node. This paper proposes an efficient feature extraction based malicious node detection system using adaptive neuro fuzzy inference system (ANFIS) classification approach. In this paper, trust function features and service trust features are extracted from trusty and malicious nodes. These extracted features are trained and classified using ANFIS classifier. The performance of the proposed malicious node detection in MANET system is analyzed in terms of throughput, average packet loss ratio, energy consumption and detection ratio.
引用
收藏
页码:13445 / 13452
页数:7
相关论文
共 50 条
  • [1] Performance analysis of malicious node detection in MANET using ANFIS classification approach
    Kumaravel, A.
    Chandrasekaran, M.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 13445 - 13452
  • [2] Detection and avoidance of malicious node in MANET
    Patel, Kajal S.
    Shah, J. S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [3] Performance Analysis of Breast Cancer Detection Method Using ANFIS Classification Approach
    Nagalakshmi, K.
    Suriya, S. Dr
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (01): : 501 - 517
  • [4] Malicious node identification using quantitative intrusion detection techniques in MANET
    M. Arul Selvan
    S. Selvakumar
    [J]. Cluster Computing, 2019, 22 : 7069 - 7077
  • [5] Malicious node identification using quantitative intrusion detection techniques in MANET
    Selvan, M. Arul
    Selvakumar, S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7069 - S7077
  • [6] Performance analysis of proposed mobile autonomous agent for detection of malicious node and protecting against attacks in MANET
    John, T. Stephen
    Aranganathan, A.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [7] Cross Layer Approach to Detect Malicious Node in MANET
    Patil, Vidya N.
    Thorat, Sandeep A.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [8] A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System
    Tamilarasan, S.
    Aramudan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (05): : 258 - 264
  • [9] Detection of Malicious Attack in MANET A Behavioral Approach
    Patel, Meenakshi
    Sharma, Sanjay
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 388 - 393
  • [10] Improved EAACK Scheme for Detection and Isolation of a Malicious Node in MANET
    Patil, Ashish
    Marathe, Nilesh
    Padiya, Puja
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 529 - 533