Academic literature on the topic 'Cooperative bait detection scheme'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cooperative bait detection scheme.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cooperative bait detection scheme"

1

Olushola O, Akinlemi, and K. Suresh Babu. "Cooperative Bait Detection Scheme (CBDS) To Avoid the Collaborative Attacks of Nodes in MANET." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 66–69. https://doi.org/10.70729/j2013475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

R. Saranya,, and Dr R. S. Rajesh. "Detection of Black Hole Attack in DSR Routing Protocol by modified cooperative bait detection scheme." International Journal of Research in Advent Technology 7, no. 1 (2019): 475–83. http://dx.doi.org/10.32622/ijrat.71201999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khalaf, Osamah Ibrahim, F. Ajesh, Abdulsattar Abdullah Hamad, Gia Nhu Nguyen, and Dac-Nhuong Le. "Efficient Dual-Cooperative Bait Detection Scheme for Collaborative Attackers on Mobile Ad-Hoc Networks." IEEE Access 8 (2020): 227962–69. http://dx.doi.org/10.1109/access.2020.3045004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

SULTANA, FARHEEN, and RAKSHANDA KAUKAB. "An Acknowledgement Based Advance for the Recognition of Routing Misconduct in MANETS." International Journal of Scientific Engineering and Technology Research 06, no. 06 (2017): 1178–84. https://doi.org/10.5281/zenodo.802406.

Full text
Abstract:
With the advent of mobile technology, the wireless communication is becoming more popular than ever before. This is due to technological advances in wireless data communication devices. A primary requirement for the establishment of communication between two devices is that intermediate nodes should cooperate with each other. Presence of malevolent nodes may lead to serious security concerns. Preventing and detecting malicious nodes and attacks is a challenge. This Paper attempts to resolve this issue by designing a Cooperative Bait Detection Scheme (CBDS) that has advantages of both proactive
APA, Harvard, Vancouver, ISO, and other styles
5

M, V. Narayana, Narsimha Dr.G, and SSVN Sarma Prof. "IMPLEMENTATION OF MANET CONTROL PACKET DROP USING BAIT DETECTION APPROACH." International Journal of Engineering Sciences & Research Technology 5, no. 3 (2016): 147–55. https://doi.org/10.5281/zenodo.47008.

Full text
Abstract:
The conception following this development is the communication between nodes with the purpose of nodes cooperating with a piece of other. The expansion of mean nodes can direct to severe security concern; such nodes may interrupt the routing process. In this environment to prevent or detect malicious nodes, an instigation of greenhole or collaborative blackhole attack must be a dispute. This issue attempt to declaration by designing a Dynamic Routing (DR)-based routing technique, which is referred to as the helpful Bait Detection System (BDS) which integrate the compensation of both proactive
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Li Na, and Chun Yu Miao. "Spectrum Detection for Cognitive Radio Based on Auto-Adaptive Threshold." Advanced Materials Research 187 (February 2011): 614–20. http://dx.doi.org/10.4028/www.scientific.net/amr.187.614.

Full text
Abstract:
This paper proposed a cooperative spectrum sensing scheme based on auto-adaptive threshold in multi-user cognitive radio network, which can improve detection performance of cognitive user. According to closed-form expressions of detection probability, we compared the noncooperative scheme with the multi-user cooperative scheme, and compared the auto-adaptive threshold with fixed threshold in terms of detection probability through imitation. Result shown that the detection probability of multi-user cooperative detection is improved greatly compared to traditional noncooperative detection, and a
APA, Harvard, Vancouver, ISO, and other styles
7

K., Sahana. "An Energy Efficient and Secure Cooperative Bait Detection and Defense Approach in MANET’s." International Journal of Computer Applications 172, no. 1 (2017): 41–45. http://dx.doi.org/10.5120/ijca2017915062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Wei, Xiao Fei Zhang, and Xiao Ming Chen. "A SSDF-Attack-Exclusion Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks." Applied Mechanics and Materials 556-562 (May 2014): 5219–22. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5219.

Full text
Abstract:
Compared with the single user spectrum sensing, cooperative spectrum sensing is a promising way to improve the detection precision. However, cooperative spectrum sensing is vulnerable to a variety of attacks, such as the spectrum sensing data falsification attack (SSDF attack). In this paper, we propose a concise cooperative spectrum sensing scheme based on a reliability threshold. We analyze the utility function of SSDF attacker in this scheme, and present the least reliability threshold for the fusion center against SSDF attack. Simulation results show that compared with the traditional coop
APA, Harvard, Vancouver, ISO, and other styles
9

Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai. "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach." IEEE Systems Journal 9, no. 1 (2015): 65–75. http://dx.doi.org/10.1109/jsyst.2013.2296197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

M, Mohan. "A Survey on Secure Cooperative Bait Detection Approach for Detecting Malicious Nodes in MANETs." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 3 (2015): 1066–69. http://dx.doi.org/10.17762/ijritcc2321-8169.150337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cooperative bait detection scheme"

1

Sahu, Mayank, and Amit Baghel. "Modified Soft Combination Scheme for Cooperative Sequential Detection Considering Fast-Fading in Cognitive Radios." In International Conference on Intelligent Computing and Smart Communication 2019. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0633-8_126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Charan, Chhagan, and Rajoo Pandey. "Cooperative Spectrum Sensing Using Eigenvalue-Based Double-Threshold Detection Scheme for Cognitive Radio Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1822-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chakrabarti, Chandrima, Ananya Banerjee, Sanchari Chakrabarti, and Angana Chakraborty. "A Novel Approach for Non-cooperative Node Detection and Avoidance Using Reputation-Based Scheme in Mobile Ad hoc Network." In Computational Advancement in Communication Circuits and Systems. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2274-3_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elazreg, Abdulghani, and Ahmad Kharaz. "Sub-Optimum Detection Scheme for Distributed Closed-Loop Quasi Orthogonal Space Time Block Coding in Asynchronous Cooperative Two Dual-Antenna Relay Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18802-7_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Kai, Shuguang Liu, Xiuguang Li, and Xu An Wang. "D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks." In Sensor Technology. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch016.

Full text
Abstract:
Wireless sensor networks (WSNs) is a key technology which is deployed under the assumption that participating sensors are cooperative in forwarding each other's packets. However, some nodes may behave selfishly by dropping other's packets or refusing to provide services in an attempt to maximize its throughput with minimum expense. In this paper, the authors present a novel detection scheme based on Dempster-Shafer (D-S) evidence theory in WSN to detect and isolate misbehavior sensors. However, when the scheme is operated, counter-intuitive results may appear. To overcome this problem, this pa
APA, Harvard, Vancouver, ISO, and other styles
6

Bhowmick, Abhijit, Sanjay Dhar Roy, and Sumit Kundu. "Cooperative Spectrum Sensing Under Double Threshold With Censoring and Hybrid Spectrum Access Schemes in Cognitive Radio Network." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-5354-0.ch010.

Full text
Abstract:
The spectrum sensing performance in cooperative cognitive radio (CR) network is studied under a double threshold (DTH)-based detection with censoring of CRs, and thereafter, the study is extended for a hybrid spectrum access scheme in presence of Rayleigh faded sensing (S) and reporting (R) channels. In spectrum sensing, a CR employs an energy detection to detect the presence of primary user (PU) and compares the received energy statistics with the DTH. The CRs with energy statistics lying in fuzzy zone are not allowed to send their sensing information to the fusion centre (FC). Further, the q
APA, Harvard, Vancouver, ISO, and other styles
7

Han, Chong, Sami Muhaidat, Ibrahim Abualhaol, Mehrdad Dianati, and Rahim Tafazolli. "Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers." In Transportation Systems and Engineering. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8473-7.ch010.

Full text
Abstract:
Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of transportation systems, providing drivers with timely information on road and traffic conditions, and achieving smooth traffic flow on the roads. Recently, the security of VANETs has attracted major attention for the possible presence of malicious elements, and the presence of altered messages due
APA, Harvard, Vancouver, ISO, and other styles
8

Han, Chong, Sami Muhaidat, Ibrahim Abualhaol, Mehrdad Dianati, and Rahim Tafazolli. "Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers." In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4691-9.ch008.

Full text
Abstract:
Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of transportation systems, providing drivers with timely information on road and traffic conditions, and achieving smooth traffic flow on the roads. Recently, the security of VANETs has attracted major attention for the possible presence of malicious elements, and the presence of altered messages due
APA, Harvard, Vancouver, ISO, and other styles
9

Ferrag, Mohamed Amine, and Abdelaziz Amara korba. "Achieving Secure and Privacy-Preserving in Mobile Social Networks." In Handbook of Research on Cloud Computing and Big Data Applications in IoT. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8407-0.ch006.

Full text
Abstract:
This chapter proposes a security framework for achieving secure and privacy-preserving mobile social networks named ASPP. Based on the cooperative neighbor, reactive routing protocol, and short signatures technique, the proposed scheme can not only detect and avoid but also can preserve the message privacy against elemental attacks and compound attacks. In addition, ASPP is robust against eavesdropping attack, wormhole attack, packet analysis attack, packet tracing attack, and replay attack. Extensive analyses and experiments are given to demonstrate its high detection rate and practicability
APA, Harvard, Vancouver, ISO, and other styles
10

Ferrag, Mohamed Amine, and Abdelaziz Amara korba. "Achieving Secure and Privacy-Preserving in Mobile Social Networks." In Research Anthology on Securing Mobile Technologies and Applications. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch021.

Full text
Abstract:
This chapter proposes a security framework for achieving secure and privacy-preserving mobile social networks named ASPP. Based on the cooperative neighbor, reactive routing protocol, and short signatures technique, the proposed scheme can not only detect and avoid but also can preserve the message privacy against elemental attacks and compound attacks. In addition, ASPP is robust against eavesdropping attack, wormhole attack, packet analysis attack, packet tracing attack, and replay attack. Extensive analyses and experiments are given to demonstrate its high detection rate and practicability
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cooperative bait detection scheme"

1

Islam, Anik, and Hadis Karimipour. "A Deep Learning-Based FDI Attack Detection Scheme for Secure Data Consolidation in Cooperative UxV Operations Using Zero Touch Networking." In 2024 IEEE 10th World Forum on Internet of Things (WF-IoT). IEEE, 2024. https://doi.org/10.1109/wf-iot62078.2024.10811408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Devasthali, Anita Carolene Sandeep, and Sujata Kadam. "Cooperative bait detection scheme in MANETs." In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI). IEEE, 2017. http://dx.doi.org/10.1109/icpcsi.2017.8391799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Emimajuliet, P., and V. Thirilogasundari. "Defending collaborative attacks in MANETs using Modified Cooperative Bait Detection Scheme." In 2016 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2016. http://dx.doi.org/10.1109/icices.2016.7518906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Umar, Mubarak, Abdulrashid Sabo, and Auwal A. Tata. "Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET." In 2018 International Conference on Networking and Network Applications (NaNA). IEEE, 2018. http://dx.doi.org/10.1109/nana.2018.8648739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Renu, and Jitender Grover. "Mitigation of byzantine attack using enhanced cooperative bait detection and prevention scheme (ECBDPS)." In 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions). IEEE, 2015. http://dx.doi.org/10.1109/icrito.2015.7359296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dumne, Pradeep R., and Arati Manjaramkar. "Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs." In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2016. http://dx.doi.org/10.1109/icrito.2016.7785004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Jian-Ming, Po-Chun Tsou, Han-Chieh Chao, and Jiann-Liang Chen. "CBDS: A Cooperative Bait Detection Scheme to prevent malicious node for MANET based on hybrid defense architecture." In Electronic Systems Technology (Wireless VITAE). IEEE, 2011. http://dx.doi.org/10.1109/wirelessvitae.2011.5940839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nachammai, M., and N. Radha. "Securing data transmission in MANET using an improved Cooperative Bait Detection approach." In 2016 IEEE International Conference on Advances in Computer Applications (ICACA). IEEE, 2016. http://dx.doi.org/10.1109/icaca.2016.7887968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Deny, J., A. Sivanesh Kumar, M. Sundarajan, and V. Khanna. "Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach." In 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET). IEEE, 2017. http://dx.doi.org/10.1109/icammaet.2017.8186703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chelani, Pooja L., and Sudhir T. Bagde. "Detecting collaborative attacks by malicious nodes in MANET: An improved bait detection scheme." In 2016 International Conference on Communication and Electronics Systems (ICCES). IEEE, 2016. http://dx.doi.org/10.1109/cesys.2016.7889994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!