{"title":"基于模糊逻辑系统的无线局域网入侵检测系统","authors":"K. Bala, J. Paramesh, K. Elma, S. Santhanalakshmi","doi":"10.1109/IDCIoT56793.2023.10053550","DOIUrl":null,"url":null,"abstract":"The Mobile Ad hoc network (MANET) is a kind of wireless communication network that is composed of several nodes which are highly movable throughout the various directions in the network. Due to nonexistence of infrastructure in the MANET, the nodes can interconnect with one another in a random fashion. The Intrusion Detection System (IDS) is an observing parameter which is used to identify the suspicious functioning in the network and intimates through alert to the security operation center. Based upon the constraints, the center examines the problem and solves the constraints using necessary steps and solution. The transformation of the gray hole attack. The important consequences in the wireless sensor network involves the grey hole attack. It is a revolution of the black hole attack. This leads to decrease the efficiency of the network. Thus, to overcome the various malicious attacks, the proposed system is implemented with fuzzy logic system to enhance the efficiency in the networking system.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"40 1","pages":"941-945"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Intrusion Detection System for MANET to Detect Gray Hole Attack using Fuzzy Logic System\",\"authors\":\"K. Bala, J. Paramesh, K. Elma, S. Santhanalakshmi\",\"doi\":\"10.1109/IDCIoT56793.2023.10053550\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Mobile Ad hoc network (MANET) is a kind of wireless communication network that is composed of several nodes which are highly movable throughout the various directions in the network. Due to nonexistence of infrastructure in the MANET, the nodes can interconnect with one another in a random fashion. The Intrusion Detection System (IDS) is an observing parameter which is used to identify the suspicious functioning in the network and intimates through alert to the security operation center. Based upon the constraints, the center examines the problem and solves the constraints using necessary steps and solution. The transformation of the gray hole attack. The important consequences in the wireless sensor network involves the grey hole attack. It is a revolution of the black hole attack. This leads to decrease the efficiency of the network. Thus, to overcome the various malicious attacks, the proposed system is implemented with fuzzy logic system to enhance the efficiency in the networking system.\",\"PeriodicalId\":60583,\"journal\":{\"name\":\"物联网技术\",\"volume\":\"40 1\",\"pages\":\"941-945\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"物联网技术\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/IDCIoT56793.2023.10053550\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"物联网技术","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/IDCIoT56793.2023.10053550","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Intrusion Detection System for MANET to Detect Gray Hole Attack using Fuzzy Logic System
The Mobile Ad hoc network (MANET) is a kind of wireless communication network that is composed of several nodes which are highly movable throughout the various directions in the network. Due to nonexistence of infrastructure in the MANET, the nodes can interconnect with one another in a random fashion. The Intrusion Detection System (IDS) is an observing parameter which is used to identify the suspicious functioning in the network and intimates through alert to the security operation center. Based upon the constraints, the center examines the problem and solves the constraints using necessary steps and solution. The transformation of the gray hole attack. The important consequences in the wireless sensor network involves the grey hole attack. It is a revolution of the black hole attack. This leads to decrease the efficiency of the network. Thus, to overcome the various malicious attacks, the proposed system is implemented with fuzzy logic system to enhance the efficiency in the networking system.