Skip to main content
Erschienen in: Mobile Networks and Applications 2/2019

02.09.2017

Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network

verfasst von: G. Arulkumaran, R. K. Gnanamurthy

Erschienen in: Mobile Networks and Applications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless communication technique is crucial during inaccessible disasters, military operation and natural climate adapt. Military application required secure way of data transmission and protect data from third party. However in Mobile Adhoc Network (MANET) due to dynamic topology the nodes are prone to a variety of security attacks like modifying the data, sniffing the information, inhibited by limited energy, computational power and bandwidth. Black hole attacks are one of the possible attacks in MANET. We propose fuzzy logic strategy to detect black hole attack based on certificate authority, energy auditing, packet veracity check and trust node to improve the performance of AODV. Fuzzy schema is a mathematical logic that attempts to work out problems by assigning the prediction values to an imprecise range of data. Fuzzy logic detect misbehaving node by giving certificate to only trusted node. The proposed technique is more secure and reliable in military data communication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Aliahmadipour L, Torra V, Eslami E (2017) On hesitant fuzzy clustering and clustering of hesitant fuzzy data. In: Torra V, Dahlbom A, Narukawa Y (eds) Fuzzy sets, rough sets, multisets and clustering. Studies in Computational Intelligence, vol 671. Springer, Cham. https://doi.org/10.1007/978-3-319-47557-8_10 Aliahmadipour L, Torra V, Eslami E (2017) On hesitant fuzzy clustering and clustering of hesitant fuzzy data. In: Torra V, Dahlbom A, Narukawa Y (eds) Fuzzy sets, rough sets, multisets and clustering. Studies in Computational Intelligence, vol 671. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-319-47557-8_​10
2.
Zurück zum Zitat Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. Cluster computing 20(2):1517–1525 Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. Cluster computing 20(2):1517–1525
3.
Zurück zum Zitat Wang Y, Chen L (2017) Multi-view fuzzy clustering with minimax optimization for effective clustering of data from multiple sources. Expert Syst Appl 72:457–466 Wang Y, Chen L (2017) Multi-view fuzzy clustering with minimax optimization for effective clustering of data from multiple sources. Expert Syst Appl 72:457–466
4.
Zurück zum Zitat Valarmozhi A, Subala M, Muthu V (2012) Survey of wireless mesh network. International Journal of Engineering and Innovative Technology (IJEIT) 2(6) Valarmozhi A, Subala M, Muthu V (2012) Survey of wireless mesh network. International Journal of Engineering and Innovative Technology (IJEIT) 2(6)
6.
Zurück zum Zitat Sahu P, Bisoy SK, Sahoo S (2013) Detecting and isolating malicious node in AODV routing algorithm. Int J Comput Appl 66(16):0975–8887 Sahu P, Bisoy SK, Sahoo S (2013) Detecting and isolating malicious node in AODV routing algorithm. Int J Comput Appl 66(16):0975–8887
7.
Zurück zum Zitat Sheela D, Srividhya VR, Anjali AB, Chidanand GM (2012) Detecting black hole attacks in wireless sensor networks using mobile agent. International conference on artificial intelligence and embedded systems (ICAIES'2012), Singapore Sheela D, Srividhya VR, Anjali AB, Chidanand GM (2012) Detecting black hole attacks in wireless sensor networks using mobile agent. International conference on artificial intelligence and embedded systems (ICAIES'2012), Singapore
8.
Zurück zum Zitat Sethi S, Udgata SK (2011) Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks. In: Sombattheera C, Agarwal A, Udgata SK, Lavangnananda K (eds) Multi-disciplinary trends in artificial intelligence. MIWAI 2011. Lecture Notes in Computer Science, vol 7080. Springer, Berlin, Heidelberg Sethi S, Udgata SK (2011) Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks. In: Sombattheera C, Agarwal A, Udgata SK, Lavangnananda K (eds) Multi-disciplinary trends in artificial intelligence. MIWAI 2011. Lecture Notes in Computer Science, vol 7080. Springer, Berlin, Heidelberg
9.
Zurück zum Zitat Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. Information Security, IET 6, no. 2, Pp. 77–83 Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. Information Security, IET 6, no. 2, Pp. 77–83
10.
Zurück zum Zitat Xia H, Jia Z, Li X, Lei J, Sha EH-M (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114CrossRef Xia H, Jia Z, Li X, Lei J, Sha EH-M (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114CrossRef
11.
Zurück zum Zitat Krishna R, Mandal JK, Singh MM (2013) QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack. Procedia Technol 10:530–537CrossRef Krishna R, Mandal JK, Singh MM (2013) QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack. Procedia Technol 10:530–537CrossRef
13.
Zurück zum Zitat Khamayseh Y, Bader A, Mardini W, Bani Yasein M (2011) A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks. International Journal of Communication Networks and Information Security 3(1):36 Khamayseh Y, Bader A, Mardini W, Bani Yasein M (2011) A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks. International Journal of Communication Networks and Information Security 3(1):36
14.
Zurück zum Zitat Raj PN, Swadesh PB (2009) DPRAODV: a dynamic learning system against Blackhole attack in AODV based MANET. Int J Comput Sci 2:54–59. Raj PN, Swadesh PB (2009) DPRAODV: a dynamic learning system against Blackhole attack in AODV based MANET. Int J Comput Sci 2:54–59.
15.
Zurück zum Zitat Gayatri V, Gomathi C (2012) Electing monitoring node through fuzzy theory in wireless mesh network for defense against selective forwarding attack. Int J Comput Eng volume 02– no. 2, issue: 02 Gayatri V, Gomathi C (2012) Electing monitoring node through fuzzy theory in wireless mesh network for defense against selective forwarding attack. Int J Comput Eng volume 02– no. 2, issue: 02
16.
Zurück zum Zitat Gnanamurthy RK, Malathi L (2012) A novel routing protocol with lifetime maximizing clustering algorithm for WSN India conference (INDICON), (2012) annual IEEE925-930 Gnanamurthy RK, Malathi L (2012) A novel routing protocol with lifetime maximizing clustering algorithm for WSN India conference (INDICON), (2012) annual IEEE925-930
Metadaten
Titel
Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network
verfasst von
G. Arulkumaran
R. K. Gnanamurthy
Publikationsdatum
02.09.2017
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 2/2019
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-017-0912-z

Weitere Artikel der Ausgabe 2/2019

Mobile Networks and Applications 2/2019 Zur Ausgabe

Neuer Inhalt