Open Access   Article Go Back

Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network

A. Sharma1 , P.K. Johari2

  1. Dept. of CSE and IT, Madhav Institute of Technology and Science, Gwalior, India.
  2. Dept. of CSE and IT, Madhav Institute of Technology and Science, Gwalior, India.

Correspondence should be addressed to: aastha.iitm@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 34-41, May-2017

Online published on May 30, 2017

Copyright © A. Sharma, P.K. Johari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Sharma, P.K. Johari , “Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.34-41, 2017.

MLA Style Citation: A. Sharma, P.K. Johari "Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network." International Journal of Computer Sciences and Engineering 5.5 (2017): 34-41.

APA Style Citation: A. Sharma, P.K. Johari , (2017). Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network. International Journal of Computer Sciences and Engineering, 5(5), 34-41.

BibTex Style Citation:
@article{Sharma_2017,
author = {A. Sharma, P.K. Johari },
title = {Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {34-41},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1260},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1260
TI - Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network
T2 - International Journal of Computer Sciences and Engineering
AU - A. Sharma, P.K. Johari
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 34-41
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
953 615 downloads 514 downloads
  
  
           

Abstract

Transmitting data securely counter to the mischievous attacks is always concern as a severe issue in an infrastructure less dynamic network called mobile-ad-hoc-network (MANET). Trust assertion between MANET (mobility) nodes is the major attribute for highly secure execution under dynamic topology deflection and open wireless environment. But the mischievous behavior of nodes weakens the trust level of MANET that drags to an untrusted data delivery. The expansion in maligning attacks due to dynamic nature of MANET causes the excessive energy consumption that result in reduction of network lifetime. Trust parameters are adequate to handle the secure route finding procedure. In this composition we also used Fuzzy logic as trusted tool for mitigating the Collaborative Blackhole attack in MANET. This composition recommends a trusted-fuzzy-ad-hoc routing protocol to upgrade the trust between the nodes in MANET. The recommended method customizes the conventional AODV routing protocol. Mischievous behavior nodes are predicted on the basis of mobility based constraints. The packet sequence number is compatible to the log reports of nearby resident nodes, confirms the reliability to the network establishes the trust that avoids the malicious node generation. The result analysis between the proposed technique with the pre-existent technique regarding the routing overhead, throughput, packet delivery ratio shows the effectiveness of trusted-fuzzy-ad-hoc routing protocol in the secure MANET environment.

Key-Words / Index Term

MANET, Routing Protocol, AODV, Collaborative Black-hole Attack, Black-hole Attack

References

[1] S. Banerjee, R. Nandi, R. Dey, H.N. Saha, “A review on different Intrusion Detection Systems for MANET and its Vulnerabilities”, In the Proceedings of the 2015 IEEE International Conference and Workshop on Computing and Communication (IEMCON), Canada, pp.1-7, 2015.
Google Scholar

[2] N.K. Pandey, A.K. Mishra, “An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.60-63, 2014.
Google Scholar

[3] SL. Mewadal, P. Sharma, SS. Gautam, S. Sharma, P. Agiwal, A. Shrivastava, “Simulation Based Performance Analysis of DSDV OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2”, Research Journal of Computer and Information Technology Sciences, Vol.4, Issue.1, pp.1-7, Jan 2016
Google Scholar

[4] N. Mannan, S. Khurana, “Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.233-237, 2014.
Google Scholar

[5] I.D. Chakeres, “AODV Routing Protocol Implementation Design”, In the Proceedings of the 2004 IEEE 24th International Conference on Distributed Computing Systems Workshops, Japan, pp. 698-703, 2004.
Google Scholar

[6] F.H. Tseng, L.D. Chou, H.C. Chao, “A survey of black hole attacks in wireless Mobile ad-hoc networks”, Human-centric Computing and Information Sciences, Vol.1, Issue.1, pp.1-4, 2011.
Google Scholar

[7] UK Singh, J Patidar, KC. Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
Google Scholar

[8] S.V.S.G. Devi, “Prediction Of A Class Variable In Classification Problem Using Fuzzy Inference Method”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.1, pp.28-29, 2014.
Google Scholar

[9] L.A. Zadeh, “The Role of Fuzzy Logic in the Management of Uncertainty in Expert Systems”, Fuzzy Sets and Systems, Vol.11, Issue.3, pp.199-227, 1983.
Google Scholar

[10] J. Thakker, J. Desai, L. Ragha, “Avoidance of Co-operative black hole attack in AODV in MANET”, In the Proceedings of the 2016 IEEE International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, pp.1-7, 2016.
Google Scholar

[11] Vaishnavi Katkar , Sagar Indore, Tushar Pokharkar, Kajal Inamdar, “Detecting Spam Zombies by Monitoring Outgoing Messages and DoS View”, International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.1, pp.5-11, 2016.
Google Scholar

[12] S. Nath, S. Banik, A. Seal, S.K. Sarkar, “Optimizing MANET routing in AODV : An Hybridization approach of ACO and Firefly Algorithm”, In the Proceedings of the 2016 IEEE Second International conference on Research in Computational Intelligence and Communication Networks, Kolkata India, pp.23-28, 2016
Google Scholar

[13] P.S. Hiremath, T. Anuradha, P. Pattan, “Adaptive Fuzzy Inference System for Detection and Prevention of Cooperative Black Hole Attack in MANETs”, In the Proceedings of the 2016 IEEE International Conference on Information Science, Kochi India, pp.145-151, 2016.
Google Scholar

[14] Bala Chandra, N.P. Shetty, “Interception of Black- Hole Attacks in Mobile AD-HOC Networks”, In the Proceedings of the 2016 IEEE International Conference on Inventive Computation Technologies, Coimbatore India, pp.105, 2016.
Google Scholar

[15] PK. Sharma, SL. Mewada, P. Nigam, “Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
Google Scholar

[16] E.V. Balan, M.K. Priyan, C. Gokulnath, G.U. Devi, “Fuzzy Based Intrusion Detection Systems in MANET”, 2nd International Symposium on Big Data and Cloud Computing, India, pp.109-114, 2015.
Google Scholar

[17] V. Thakur, L. Shrivastava, S.S. Bhadauria, “Performance Evaluation of AODV Using Fuzzy Logic to Reduce Congestion in MANET”, Asia-pacific Journal of Multimedia Services Convergent with Art Humanities and Sociology, Vol.5, Issue.5, pp.1-9, 2015.
Google Scholar

[18] A. Chaudhary , A. Kumar , V.N. Tiwari, “A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs”, In the Proceedings of the 2014 IEEE International Conference on Reliability Optimization and Information Technology, Faridabad India, pp.178-181, 2014.
Google Scholar

[19] S. Madhurikkha, C.M. Kumari, S. Revathi, P. Nathiya, “Preventing Packet Dropping Attack in Ad hoc Networks Using Malicious node Isolation Model”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.72-177, 2015.
Google Scholar

[20] K. Narang, “Black Hole Attack Detection using Fuzzy Logic”, International Journal of Science and Research (IJSR), Vol.2, Issue.8, pp.222-225, 2013.
Google Scholar

[21] Bhagyashree Thakur, Sharda Patel, Ashok Verma, Shivendu Dubey, “Simulation Of Blackhole Nodes And Prevention Using IDS For MANET Reactive Routing Protocol AODV”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.114-120, 2014.
Google Scholar