Fuzzy Based Detection of Malicious Activity for Security Assessment of MANET

被引:10
作者
Bisen, Dhananjay [1 ]
Sharma, Sanjeev [1 ]
机构
[1] RGPV, Sch Informat Technol, Bhopal, India
来源
NATIONAL ACADEMY SCIENCE LETTERS-INDIA | 2018年 / 41卷 / 01期
关键词
MANET; FIS; Fuzzy logic; AODV; Packet dropping; Malicious activity; AD HOC NETWORKS; INTRUSION DETECTION; ROUTING PROTOCOLS; LOGIC;
D O I
10.1007/s40009-017-0602-1
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation, congestion, energy constrained, variable capacity links and security. Due to security vulnerabilities and dynamic nature of network, wireless mobile ad-hoc networks may be unprotected against packet dropping attacks by any unauthorized node. This paper proposes fuzzy based secure architecture (FBSA) for mobile ad-hoc network in which node classification and detection of malicious activity is done through fuzzy detector. After detection of malicious activity, comparative study is performed on various parameters such as packet delivery ratio, average throughput, total packet forwarding and percentage of detection with variation in node speed.
引用
收藏
页码:23 / 28
页数:6
相关论文
共 19 条
[1]  
Agarwal R, 2015, INT J ELECT
[2]  
Anjum Farooq., 2007, SECURITY WIRELESS AD
[3]  
[Anonymous], 2001, CHAPTER 4 AD HOC NET
[4]  
[Anonymous], 2017, Fuzzy Logic With Engineering Applications
[5]   A systematic review on routing protocols for Vehicular Ad Hoc Networks [J].
Dua, Amit ;
Kumar, Neeraj ;
Bawa, Seema .
VEHICULAR COMMUNICATIONS, 2014, 1 (01) :33-52
[6]   A survey of recent advances in fuzzy logic in telecommunications networks and new challenges [J].
Ghosh, S ;
Razouqi, Q ;
Schumacher, HJ ;
Celmins, A .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 1998, 6 (03) :443-447
[7]  
Gomez J., 2002, P 2002 IEEE WORKSH I, V6, P321
[8]  
Huang YA, 2004, LECT NOTES COMPUT SC, V3224, P125
[9]   A Fast Fuzzy Set Intrusion Detection Model [J].
Lin Jianhui ;
Huang Tianshu ;
Zhao Bingjie .
KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, :601-605
[10]  
Manoj B., 2004, AD HOC WIRELESS NETW