Abstract
Mobile ad hoc networks (MANETs) are much more susceptible to routing attacks as compared to wired networks and infrastructure-based wireless networks. MANETs lack infrastructure and trusted centralized authority, thereby vulnerable to black hole attacks. This paper presents novel approach based on weighted binary relational fuzzy trust model to mitigate black hole attacks in ad hoc on demand distance vector (AODV) protocol. It uses trust computing approach, which is by default a fuzzy approach. Direct trust computation method is applied to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jain A. and Tokekar V.: Classification of denial of service attacks in mobile ad hoc networks, Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN), pp 256–261, 2011
Govindan K., Mohapatra P.,:Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials (Volume: 14, Issue: 2, Second Quarter 2012), pp: 279–298,2012
Jain, A. K., & Tokekar, V. (2015).: Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In Pervasive computing (ICPC), 2015 international conference on (pp. 1–6)
Singhal, S. & Daniel, A. K., (2014).: Fuzzy logic based clusterhead selection protocol under Competence level, Goodness function and Mobility for mobile ad hoc network. In 2014 Conference on IT in business, industry and government (CSIBIG) (Vol. 8–9, pp. 1–6).
Qureshi B., Min G. and Kouvatsos D.:A distributed reputation and trust management scheme for mobile peer to peer networks, in Computer Communications pp 608–619
Nguyen H., Nguyen U.,: A study of different types of attacks in mobile ad hoc networks 25th IEEE Canadian conference on Electrical & Computer Engineering, 2012
Ayday E., Fekri F.: An Iterative algorithm for trust management and adversary detection for Delay-tolerant Networks, IEEE Transaction on Mobile Computing, Vol 11. No. 9, pp 1514 – 1531, 2012
Mohanty S., Thotakura V., Ramkumar M.: An efficient trusted computing base for MANET security, journal of information security, pp 202–206, 2014
Chatterjee N., Mandal J.: Detection of Blackhole behaviour using triangular encryption in NS2, 1st International conference on computational Intelligence (CIMTA-2013), pp 524–529, 2013
Liu S., Yang Y., Wang W.: Research of AODV routing protocol for ad hoc networks, AASRI conference on parallel and distributed computing and systems, 2013
Guo J., Marshal A., Zhou B: A New trust management framework for detecting malicious and selfish behaviour for mobile ad hoc networks, International joint conference of IEEE Trustcom -11, 2011
Sivagurunathan S, Prathapchandran K:Trust Based Security Model To Withstand Against Black Hole And Grey Hole Attacks In Military Based Mobile Ad Hoc Networks, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No. 1, February 2016
Hall S. and McQuay W.: Fundamental features of a unified trust model for distributed systems, in Proceedings of National Aerospace and Electronics Conference, Dayton, Ohio, July, 20–22, 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jain, A.K., Tokekar, V., Shrivastava, S. (2018). Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks. In: Mishra, D., Azar, A., Joshi, A. (eds) Information and Communication Technology . Advances in Intelligent Systems and Computing, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-5508-9_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-5508-9_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5507-2
Online ISBN: 978-981-10-5508-9
eBook Packages: EngineeringEngineering (R0)