Skip to main content

2018 | OriginalPaper | Buchkapitel

Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks

verfasst von : Ashish Kumar Jain, Vrinda Tokekar, Shailendra Shrivastava

Erschienen in: Information and Communication Technology

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc networks (MANETs) are much more susceptible to routing attacks as compared to wired networks and infrastructure-based wireless networks. MANETs lack infrastructure and trusted centralized authority, thereby vulnerable to black hole attacks. This paper presents novel approach based on weighted binary relational fuzzy trust model to mitigate black hole attacks in ad hoc on demand distance vector (AODV) protocol. It uses trust computing approach, which is by default a fuzzy approach. Direct trust computation method is applied to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jain A. and Tokekar V.: Classification of denial of service attacks in mobile ad hoc networks, Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN), pp 256–261, 2011 Jain A. and Tokekar V.: Classification of denial of service attacks in mobile ad hoc networks, Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN), pp 256–261, 2011
2.
Zurück zum Zitat Govindan K., Mohapatra P.,:Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials (Volume: 14, Issue: 2, Second Quarter 2012), pp: 279–298,2012 Govindan K., Mohapatra P.,:Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials (Volume: 14, Issue: 2, Second Quarter 2012), pp: 279–298,2012
3.
Zurück zum Zitat Jain, A. K., & Tokekar, V. (2015).: Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In Pervasive computing (ICPC), 2015 international conference on (pp. 1–6) Jain, A. K., & Tokekar, V. (2015).: Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In Pervasive computing (ICPC), 2015 international conference on (pp. 1–6)
4.
Zurück zum Zitat Singhal, S. & Daniel, A. K., (2014).: Fuzzy logic based clusterhead selection protocol under Competence level, Goodness function and Mobility for mobile ad hoc network. In 2014 Conference on IT in business, industry and government (CSIBIG) (Vol. 8–9, pp. 1–6). Singhal, S. & Daniel, A. K., (2014).: Fuzzy logic based clusterhead selection protocol under Competence level, Goodness function and Mobility for mobile ad hoc network. In 2014 Conference on IT in business, industry and government (CSIBIG) (Vol. 8–9, pp. 1–6).
5.
Zurück zum Zitat Qureshi B., Min G. and Kouvatsos D.:A distributed reputation and trust management scheme for mobile peer to peer networks, in Computer Communications pp 608–619 Qureshi B., Min G. and Kouvatsos D.:A distributed reputation and trust management scheme for mobile peer to peer networks, in Computer Communications pp 608–619
6.
Zurück zum Zitat Nguyen H., Nguyen U.,: A study of different types of attacks in mobile ad hoc networks 25th IEEE Canadian conference on Electrical & Computer Engineering, 2012 Nguyen H., Nguyen U.,: A study of different types of attacks in mobile ad hoc networks 25th IEEE Canadian conference on Electrical & Computer Engineering, 2012
7.
Zurück zum Zitat Ayday E., Fekri F.: An Iterative algorithm for trust management and adversary detection for Delay-tolerant Networks, IEEE Transaction on Mobile Computing, Vol 11. No. 9, pp 1514 – 1531, 2012 Ayday E., Fekri F.: An Iterative algorithm for trust management and adversary detection for Delay-tolerant Networks, IEEE Transaction on Mobile Computing, Vol 11. No. 9, pp 1514 – 1531, 2012
8.
Zurück zum Zitat Mohanty S., Thotakura V., Ramkumar M.: An efficient trusted computing base for MANET security, journal of information security, pp 202–206, 2014 Mohanty S., Thotakura V., Ramkumar M.: An efficient trusted computing base for MANET security, journal of information security, pp 202–206, 2014
9.
Zurück zum Zitat Chatterjee N., Mandal J.: Detection of Blackhole behaviour using triangular encryption in NS2, 1st International conference on computational Intelligence (CIMTA-2013), pp 524–529, 2013 Chatterjee N., Mandal J.: Detection of Blackhole behaviour using triangular encryption in NS2, 1st International conference on computational Intelligence (CIMTA-2013), pp 524–529, 2013
10.
Zurück zum Zitat Liu S., Yang Y., Wang W.: Research of AODV routing protocol for ad hoc networks, AASRI conference on parallel and distributed computing and systems, 2013 Liu S., Yang Y., Wang W.: Research of AODV routing protocol for ad hoc networks, AASRI conference on parallel and distributed computing and systems, 2013
11.
Zurück zum Zitat Guo J., Marshal A., Zhou B: A New trust management framework for detecting malicious and selfish behaviour for mobile ad hoc networks, International joint conference of IEEE Trustcom -11, 2011 Guo J., Marshal A., Zhou B: A New trust management framework for detecting malicious and selfish behaviour for mobile ad hoc networks, International joint conference of IEEE Trustcom -11, 2011
12.
Zurück zum Zitat Sivagurunathan S, Prathapchandran K:Trust Based Security Model To Withstand Against Black Hole And Grey Hole Attacks In Military Based Mobile Ad Hoc Networks, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No. 1, February 2016 Sivagurunathan S, Prathapchandran K:Trust Based Security Model To Withstand Against Black Hole And Grey Hole Attacks In Military Based Mobile Ad Hoc Networks, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No. 1, February 2016
13.
Zurück zum Zitat Hall S. and McQuay W.: Fundamental features of a unified trust model for distributed systems, in Proceedings of National Aerospace and Electronics Conference, Dayton, Ohio, July, 20–22, 2011 Hall S. and McQuay W.: Fundamental features of a unified trust model for distributed systems, in Proceedings of National Aerospace and Electronics Conference, Dayton, Ohio, July, 20–22, 2011
Metadaten
Titel
Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks
verfasst von
Ashish Kumar Jain
Vrinda Tokekar
Shailendra Shrivastava
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5508-9_4

Neuer Inhalt