10.5120/4331-024 |
Kulbhushan and Jagpreet Singh. Article: Fuzzy Logic Based Intrusion Detection System against Blackhole Attack on AODV in MANET. IJCA Special Issue on Network Security and Cryptography NSC(2):28-35, December 2011. Full text available. BibTeX
@article{key:article, author = {Kulbhushan and Jagpreet Singh}, title = {Article: Fuzzy Logic Based Intrusion Detection System against Blackhole Attack on AODV in MANET}, journal = {IJCA Special Issue on Network Security and Cryptography}, year = {2011}, volume = {NSC}, number = {2}, pages = {28-35}, month = {December}, note = {Full text available} }
Abstract
Security[16] is an essential feature for wired and wireless network[1]. But due to its unique characteristics of MANETs[10], it creates a number of consequential security challenges to network. MANETs are vulnerable to various attacks[2], blackhole[12] is one of the possible attack. In this paper, we represent an intrusion detection[5] system for MANETs against blackhole attack using fuzzy logic[4]. Our system successfully detects the blackhole in the network and this information is passed to other nodes also. We also provide a detailed performance evaluation based on various network parameters. Our results show that the proposed system not only detects the blackhole[12] node, but improves the performance of AODV under the blackhole attack.
Reference
- Andrew S Tanenbaum “ Computer Networks “ Prentice Hall of India, third edition.
- Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei,” A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks “ Department of Computer Science and Engineering, Florida Atlantic University
- C. Perkins, E Belding-Royer,( July 2003) “Ad hoc On-demand Distance Vector (AODV)” Request For Comments (RFC) 3561.
- Fuzzy Logic with Engineering Applications by Timothy J.Ross Mcgraw Hill, Inc.
- I. Stamouli, P. G. Argyroudis and H. Tewari, (2005) “Real-time intrusion detection for ad hoc Networks”, Sixth IEEE Intl Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'05), pp.374-380.
- J. Martin Leo Manickam Anna and S.Shanmugavel (2007),” Fuzzy based Trusted Ad hoc On-demand Distance Vector Routing Protocol for MANET “,third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob2007).
- Kevin Falland Kannan Varadhan, (April, 2005)”NS-Documentation, http://www.isi.edu/nsnam/ns/ns-documentation.html”.
- x M. Hollick, J. Schmitt, C. Seipl and R.Steinmetz,( June 2004) “On the effect of node misbehavior in ad hoc networks”, Proc. Of IEEE Intl Conference on Communications (ICC'04), Paris, pp. 3759-3763.
- M. Hollick, J. Schmitt, C.Seipl and R.Steinmetz, ( Feb 2004 ) “The ad hoc on- demand distance vector protocol: an analytical model of the route acquisition process”, Proc. of Second Intl Conference on Wired/Wireless Internet Communications (WWIC'04), Frankfurt, pp. 201-212.
- MANET Charter,(1998) available at http://www.ietf.org/html.charters/manet -charter html (1998-11-29).
- Payal N. Raj and Prashant B. Swadesh (2009) “DPRAODV: A Dynamic Learning System against Blackhole attack in AODV based MANET “, International Journal of Computer Science, Vol. 2.
- R.A. Raja Mahmood, A.I. Khan (2007) “A Survey on Detecting Black Hole Attack in AODV- based Mobile Ad Hoc Networks “,Clayton School of information Technology, Monash UniversityAustralia High Capacity Optical Networks and Enabling Technologies, 2007. HONET 2007. International Symposium on
- Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto (Nov. 2007) “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method “, International Journal of Network Security, Vol.5, No.3, PP.338–346,
- Timothy J. Ross,(I2000)”Fuzzy Logic with Engineering Applications”,McGraw Hill International Editions, International Editions.
- Tony Larsson and Nicklas Hedman (1998) “Routing Protocols in Wireless Ad-hoc Networks – A Simulation Study “, Lulea University of Technology , Stockholm
- V. Karpijoki,( 2000) “Security in Ad hoc Networks”, In Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland.
- Y.Zhang, W. Lee, and Y. Huang,(September 2003) “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5.
- Y. Zhang, W. Lee,(August,2000) “Intrusion Detection on Wireless Ad hoc Networks”, in Proceedings 6th Annual International Conference on Mobile Computing and Networking (MobiCom’00).