IJCNIS Vol. 9, No. 7, 8 Jul. 2017
Cover page and Table of Contents: PDF (size: 440KB)
Full Text (PDF, 440KB), PP.29-35
Views: 0 Downloads: 0
MANET Security, Attack Detection, Trust Calculation, Fuzzy Logic
Mobile ad-hoc communication is a spontaneous network because the topology is not stationary but self-organized. This requires that during the time MANET it operational, all the processes regarding discovering the topology, delivery of data packets and internal management communications must be taken care by the node(s) themselves. This implies the criteria for selection of Cluster Head (CH) and the routing related protocols are to be integrated into mobile node(s).The very facts that MANET is challenging and innovative areas of wireless networks, makes it more vulnerable in term of routing and flooding attacks. In this paper, a node trust calculation methodology is proposed which calculate the trust value of each node and applies fuzzy logic to detect wormhole, Black-hole (Routing attack) and distributed denial of service attack (DDOS/Flooding) in dynamic environment.
Ashish Kumar Khare, J. L. Rana, R. C. Jain, "Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.7, pp.29-35, 2017. DOI:10.5815/ijcnis.2017.07.04
[1]H. Yang, H. Luo, F. Ye, S. W. Lu and L Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions”,IEEE Wireless Communications Feb, 2004, pp. 38-47, vol. 11, No. 1.
[2]Bing Wu, Jianmin Chen, Jie Wu and MihaelaCardei “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks”, wireless/mobile network security, 2006 Springer.
[3]Neeraj Arya, Upendra Singh and Sushma Singh, “ Detecting and Avoiding of Worm Hole Attack and Collaborataive Blackhole attack on MANIET using Trusted AODV Routing Algorithm”, IEEE International conference on Computer, Communication and Control (IC4), 2015.
[4]H.Hallani and A.Hellany, " Wireless Ad-hoc Networks: Using Fuzzy Trust Approach to Improve Security between Nodes", In International conference on Computer Engineering & System (ICCES’09) Dec-2009, pp. 359-365.
[5]Suresh Kumar, Machha. Narender, and G. N. Ramesh, “Security Provision for Mobile Ad-Hoc Networks Using Ntp & Fuzzy Logic Techniques”, Global Journal of Computer Science and Technology, Sep. 2010, pp. 62, Vol.10, No. 8.
[6]Sakshi Jain and Dr. Ajay Khuteta, “Detecting and Overcoming Blackhole Attack in Mobile Adoc Network”, in International conference on Green Computing and Internet of Things (ICGCIOT) IEEE, June 2015, pp. 225-229.
[7]Farrukh Aslam Khan, Muhammad Imran and Hiader Abbas, “A Detection and Prevention System against Collaborative Attacks in Mobile AD hoc Networks”, Future Generation Computer System 68, 2017, ELSEVIER, pp. 416-417.
[8]Dhiraj Nitnaware and Anita Thakur, “Black Hole Attack Detection and Prevention Strategy in DYMO for MANET”, in 3rd International Conference on Signal Processing and Integrated Networks SPIN, PP. 279-284.
[9]Nitika Gupta and Shailendra Narayan Singh, “Wormhole Attacks in MANET”, in 6th INTERNATIONAL Conference – Cloud System and Big Data Engineering (Confluence), 2016, pp.236-239.
[10]H.VigneshRamamoorthy and Dr.D.Suganya Devi “A New Proposal for Route Finding in Mobile AdHoc Networks “MECS I. J. Computer Network and Information Security, 2013, 7, 1-8.
[11]ParthaSarathiBanerjee, J. Paulchoudhury and S. R. BhadraChaudhuri“Fuzzy Membership Function in a Trust Based AODV for MANET “MECS I. J. Computer Network and Information Security, 2013, 12, 27-34.
[12]Tarunpreet Bhatia and A.K. Verma “Performance Evaluation of AODV under Blackhole Attack” MECS I. J. Computer Network and Information Security, 2013, 12, 35-44.
[13]M.Madhurya, B.Ananda Krishna and T.Subhashini “Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks “MECS I.J.Computer Network and Information Security, 2014, 2, 30-37.
[14]Soumyabrata Talapatra and Alak Roy “Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network” MECS I.J. Computer Network and Information Security, 2014, 7, 42-49.
[15]Rakesh Kumar Jha and PoojaKharga “A Comparative Performance Analysis of Routing Protocols in MANET using NS3 Simulator” MECS I. J. Computer Network and Information Security, 2015, 4, 62-68.
[16]Nitin Khanna “Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography “MECS I. J. Computer Network and Information Security, 2016, 4, 37-43.