Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Fuzzy Logic Based Intrusion Detection System against Blackhole Attack on AODV in MANET

Print
PDF
Network Security and Cryptography
© 2011 by IJCA Journal
NSC - Number 2
Year of Publication: 2011
Authors:
Kulbhushan
Jagpreet Singh
10.5120/4331-024

Kulbhushan and Jagpreet Singh. Article: Fuzzy Logic Based Intrusion Detection System against Blackhole Attack on AODV in MANET. IJCA Special Issue on Network Security and Cryptography NSC(2):28-35, December 2011. Full text available. BibTeX

@article{key:article,
	author = {Kulbhushan and Jagpreet Singh},
	title = {Article: Fuzzy Logic Based Intrusion Detection System against Blackhole Attack on AODV in MANET},
	journal = {IJCA Special Issue on Network Security and Cryptography},
	year = {2011},
	volume = {NSC},
	number = {2},
	pages = {28-35},
	month = {December},
	note = {Full text available}
}

Abstract

Security[16] is an essential feature for wired and wireless network[1]. But due to its unique characteristics of MANETs[10], it creates a number of consequential security challenges to network. MANETs are vulnerable to various attacks[2], blackhole[12] is one of the possible attack. In this paper, we represent an intrusion detection[5] system for MANETs against blackhole attack using fuzzy logic[4]. Our system successfully detects the blackhole in the network and this information is passed to other nodes also. We also provide a detailed performance evaluation based on various network parameters. Our results show that the proposed system not only detects the blackhole[12] node, but improves the performance of AODV under the blackhole attack.

Reference

  • Andrew S Tanenbaum “ Computer Networks “ Prentice Hall of India, third edition.
  • Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei,” A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks “ Department of Computer Science and Engineering, Florida Atlantic University
  • C. Perkins, E Belding-Royer,( July 2003) “Ad hoc On-demand Distance Vector (AODV)” Request For Comments (RFC) 3561.
  • Fuzzy Logic with Engineering Applications by Timothy J.Ross Mcgraw Hill, Inc.
  • I. Stamouli, P. G. Argyroudis and H. Tewari, (2005) “Real-time intrusion detection for ad hoc Networks”, Sixth IEEE Intl Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'05), pp.374-380.
  • J. Martin Leo Manickam Anna and S.Shanmugavel (2007),” Fuzzy based Trusted Ad hoc On-demand Distance Vector Routing Protocol for MANET “,third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob2007).
  • Kevin Falland Kannan Varadhan, (April, 2005)”NS-Documentation, http://www.isi.edu/nsnam/ns/ns-documentation.html”.
  • x M. Hollick, J. Schmitt, C. Seipl and R.Steinmetz,( June 2004) “On the effect of node misbehavior in ad hoc networks”, Proc. Of IEEE Intl Conference on Communications (ICC'04), Paris, pp. 3759-3763.
  • M. Hollick, J. Schmitt, C.Seipl and R.Steinmetz, ( Feb 2004 ) “The ad hoc on- demand distance vector protocol: an analytical model of the route acquisition process”, Proc. of Second Intl Conference on Wired/Wireless Internet Communications (WWIC'04), Frankfurt, pp. 201-212.
  • MANET Charter,(1998) available at http://www.ietf.org/html.charters/manet -charter html (1998-11-29).
  • Payal N. Raj and Prashant B. Swadesh (2009) “DPRAODV: A Dynamic Learning System against Blackhole attack in AODV based MANET “, International Journal of Computer Science, Vol. 2.
  • R.A. Raja Mahmood, A.I. Khan (2007) “A Survey on Detecting Black Hole Attack in AODV- based Mobile Ad Hoc Networks “,Clayton School of information Technology, Monash UniversityAustralia High Capacity Optical Networks and Enabling Technologies, 2007. HONET 2007. International Symposium on
  • Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto (Nov. 2007) “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method “, International Journal of Network Security, Vol.5, No.3, PP.338–346,
  • Timothy J. Ross,(I2000)”Fuzzy Logic with Engineering Applications”,McGraw Hill International Editions, International Editions.
  • Tony Larsson and Nicklas Hedman (1998) “Routing Protocols in Wireless Ad-hoc Networks – A Simulation Study “, Lulea University of Technology , Stockholm
  • V. Karpijoki,( 2000) “Security in Ad hoc Networks”, In Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland.
  • Y.Zhang, W. Lee, and Y. Huang,(September 2003) “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5.
  • Y. Zhang, W. Lee,(August,2000) “Intrusion Detection on Wireless Ad hoc Networks”, in Proceedings 6th Annual International Conference on Mobile Computing and Networking (MobiCom’00).