Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network

被引:19
作者
Arulkumaran, G. [1 ]
Gnanamurthy, R. K. [2 ]
机构
[1] Vivekanandha Coll Engn Women Autonomous, AP IT, Tiruchengode, Tamil Nadu, India
[2] PPG Inst Technol, Coimbatore, Tamil Nadu, India
关键词
Military application; Security attacks; Fuzzy logic; MANET;
D O I
10.1007/s11036-017-0912-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless communication technique is crucial during inaccessible disasters, military operation and natural climate adapt. Military application required secure way of data transmission and protect data from third party. However in Mobile Adhoc Network (MANET) due to dynamic topology the nodes are prone to a variety of security attacks like modifying the data, sniffing the information, inhibited by limited energy, computational power and bandwidth. Black hole attacks are one of the possible attacks in MANET. We propose fuzzy logic strategy to detect black hole attack based on certificate authority, energy auditing, packet veracity check and trust node to improve the performance of AODV. Fuzzy schema is a mathematical logic that attempts to work out problems by assigning the prediction values to an imprecise range of data. Fuzzy logic detect misbehaving node by giving certificate to only trusted node. The proposed technique is more secure and reliable in military data communication.
引用
收藏
页码:386 / 393
页数:8
相关论文
共 16 条
[1]  
Aliahmadipour L, 2017, STUD COMPUT INTELL, V671, P157, DOI 10.1007/978-3-319-47557-8_10
[2]  
[Anonymous], 2009, INT COMPUT SCI
[3]   QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack [J].
Bar, Radha Krishna ;
Mandal, Jyotsna Kumar ;
Singh, Moirangthem Marjit .
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 :530-537
[4]  
Biswas S, 2014, C 2014 APPL INN MOB, DOI [10.1109/AIMOC.2014.6785535, DOI 10.1109/AIM0C.2014.6785535]
[5]  
Gayatri V, 2012, INT J COMPUT ENG, V2
[6]  
Gnanamurthy RK, 2012, C INDICON 2012
[7]  
Khamayseh Yaser, 2011, International Journal of Communication Networks and Information Security, V3, P36
[8]   Light-weight trust-based routing protocol for mobile ad hoc networks [J].
Marchang, N. ;
Datta, R. .
IET INFORMATION SECURITY, 2012, 6 (02) :77-83
[9]  
Sahu P., 2013, INT J COMPUTER APPL, V66
[10]  
Sethi S, 2011, LECT NOTES COMPUTER, V7080