Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.
Seong-Soo ParkJong-Hyouk LeeTai-Myoung ChungPublished in: ICCSA (2) (2009)
Keyphrases
- fuzzy control
- authentication scheme
- control system
- fuzzy controller
- fuzzy logic
- clustering algorithm
- smart card
- pid control
- multiple valued logic
- user authentication
- control method
- fuzzy systems
- fuzzy rules
- dissolved oxygen
- secret key
- cluster analysis
- public key
- k means
- artificial intelligence
- neural network
- authentication protocol
- control algorithm
- membership functions
- security analysis
- genetic algorithm
- data mining