Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network
Keywords:
MANET, Routing Protocol, AODV, Collaborative Black-hole Attack, Black-hole AttackAbstract
Transmitting data securely counter to the mischievous attacks is always concern as a severe issue in an infrastructure less dynamic network called mobile-ad-hoc-network (MANET). Trust assertion between MANET (mobility) nodes is the major attribute for highly secure execution under dynamic topology deflection and open wireless environment. But the mischievous behavior of nodes weakens the trust level of MANET that drags to an untrusted data delivery. The expansion in maligning attacks due to dynamic nature of MANET causes the excessive energy consumption that result in reduction of network lifetime. Trust parameters are adequate to handle the secure route finding procedure. In this composition we also used Fuzzy logic as trusted tool for mitigating the Collaborative Blackhole attack in MANET. This composition recommends a trusted-fuzzy-ad-hoc routing protocol to upgrade the trust between the nodes in MANET. The recommended method customizes the conventional AODV routing protocol. Mischievous behavior nodes are predicted on the basis of mobility based constraints. The packet sequence number is compatible to the log reports of nearby resident nodes, confirms the reliability to the network establishes the trust that avoids the malicious node generation. The result analysis between the proposed technique with the pre-existent technique regarding the routing overhead, throughput, packet delivery ratio shows the effectiveness of trusted-fuzzy-ad-hoc routing protocol in the secure MANET environment.
References
S. Banerjee, R. Nandi, R. Dey, H.N. Saha, “A review on different Intrusion Detection Systems for MANET and its Vulnerabilities”, In the Proceedings of the 2015 IEEE International Conference and Workshop on Computing and Communication (IEMCON), Canada, pp.1-7, 2015.
N.K. Pandey, A.K. Mishra, “An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.60-63, 2014.
Mewada Shivlal, Sharma Pradeep, Gautam S.S., Sharma Sarita, Agiwal Priyanka, Shrivastava Arti , “Simulation Based Performance Analysis of DSDV OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2”, Research Journal of Computer and Information Technology Sciences, Vol.4, Issue.1, pp.1-7, Jan 2016
N. Mannan, S. Khurana, “Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.233-237, 2014.
I.D. Chakeres, E.M. Belding-Royer, “AODV Routing Protocol Implementation Design”, In the Proceedings of the 2004 IEEE 24th International Conference on Distributed Computing Systems Workshops, Japan, pp. 698-703, 2004.
F.H. Tseng, L.D. Chou, H.C. Chao, “A survey of black hole attacks in wireless Mobile ad-hoc networks”, Human-centric Computing and Information Sciences, Vol.1, Issue.1, pp.1-4, 2011.
UK Singh, J Patidar, KC. Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
S.V.S.G. Devi, “Prediction Of A Class Variable In Classification Problem Using Fuzzy Inference Method”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.1, pp.28-29, 2014.
L.A. Zadeh, “The Role of Fuzzy Logic in the Management of Uncertainty in Expert Systems”, Fuzzy Sets and Systems, Vol.11, Issue.3, pp.199-227, 1983.
J. Thakker, J. Desai, L. Ragha, “Avoidance of Co-operative black hole attack in AODV in MANET”, In the Proceedings of the 2016 IEEE International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, pp.1-7, 2016.
Vaishnavi Katkar , Sagar Indore, Tushar Pokharkar, Kajal Inamdar, “Detecting Spam Zombies by Monitoring Outgoing Messages and DoS View”, International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.1, pp.5-11, 2016.
S. Nath, S. Banik, A. Seal, S.K. Sarkar, “Optimizing MANET routing in AODV : An Hybridization approach of ACO and Firefly Algorithm”, In the Proceedings of the 2016 IEEE Second International Conference on Research in Computational Intelligence and Communication Networks, Kolkata India, pp.23-28, 2016.
P.S. Hiremath, T. Anuradha, P. Pattan, “Adaptive Fuzzy Inference System for Detection and Prevention of Cooperative Black Hole Attack in MANETs”, In the Proceedings of the 2016 IEEE International Conference on Information Science, Kochi India, pp.145-151, 2016.
B. Chandra, N.P. Shetty, “Interception of Black- Hole Attacks in Mobile AD-HOC Networks”, In the Proceedings of the 2016 IEEE International Conference on Inventive Computation Technologies, Coimbatore, India, pp.105, 2016.
PK. Sharma, SL. Mewada, P. Nigam, “Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
E.V. Balan, M.K. Priyan, C. Gokulnath, G.U. Devi, “Fuzzy Based Intrusion Detection Systems in MANET”, 2nd International Symposium on Big Data and Cloud Computing, India, pp.109-114, 2015.
V. Thakur, L. Shrivastava, S.S. Bhadauria, “Performance Evaluation of AODV Using Fuzzy Logic to Reduce Congestion in MANET”, Asia-pacific Journal of Multimedia Services Convergent with Art Humanities and Sociology, Vol.5, Issue.5, pp.1-9, 2015.
A, Chaudhary , A, Kumar , V.N. Tiwari, “A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs”, In the Proceedings of the 2014 IEEE International Conference on Reliability, Optimization and Information Technology, Faridabad India, pp.178-181, 2014.
S. Madhurikkha, C.M. Kumari, S. Revathi, P. Nathiya, “Preventing Packet Dropping Attack in Ad hoc Networks Using Malicious node Isolation Model”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.72-177, 2015.
K. Narang, “Black Hole Attack Detection using Fuzzy Logic”, International Journal of Science and Research (IJSR), Vol.2, Issue.8, pp.222-225, 2013.
Bhagyashree Thakur, Sharda Patel, Ashok Verma and Shivendu Dubey, “Simulation Of Blackhole Nodes And Prevention Using IDS For MANET Reactive Routing Protocol AODV”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.114-120, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
