Skip to main content

Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks

  • Conference paper
  • First Online:
Information and Communication Technology

Abstract

Mobile ad hoc networks (MANETs) are much more susceptible to routing attacks as compared to wired networks and infrastructure-based wireless networks. MANETs lack infrastructure and trusted centralized authority, thereby vulnerable to black hole attacks. This paper presents novel approach based on weighted binary relational fuzzy trust model to mitigate black hole attacks in ad hoc on demand distance vector (AODV) protocol. It uses trust computing approach, which is by default a fuzzy approach. Direct trust computation method is applied to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain A. and Tokekar V.: Classification of denial of service attacks in mobile ad hoc networks, Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN), pp 256–261, 2011

    Google Scholar 

  2. Govindan K., Mohapatra P.,:Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials (Volume: 14, Issue: 2, Second Quarter 2012), pp: 279–298,2012

    Google Scholar 

  3. Jain, A. K., & Tokekar, V. (2015).: Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In Pervasive computing (ICPC), 2015 international conference on (pp. 1–6)

    Google Scholar 

  4. Singhal, S. & Daniel, A. K., (2014).: Fuzzy logic based clusterhead selection protocol under Competence level, Goodness function and Mobility for mobile ad hoc network. In 2014 Conference on IT in business, industry and government (CSIBIG) (Vol. 8–9, pp. 1–6).

    Google Scholar 

  5. Qureshi B., Min G. and Kouvatsos D.:A distributed reputation and trust management scheme for mobile peer to peer networks, in Computer Communications pp 608–619

    Google Scholar 

  6. Nguyen H., Nguyen U.,: A study of different types of attacks in mobile ad hoc networks 25th IEEE Canadian conference on Electrical & Computer Engineering, 2012

    Google Scholar 

  7. Ayday E., Fekri F.: An Iterative algorithm for trust management and adversary detection for Delay-tolerant Networks, IEEE Transaction on Mobile Computing, Vol 11. No. 9, pp 1514 – 1531, 2012

    Google Scholar 

  8. Mohanty S., Thotakura V., Ramkumar M.: An efficient trusted computing base for MANET security, journal of information security, pp 202–206, 2014

    Google Scholar 

  9. Chatterjee N., Mandal J.: Detection of Blackhole behaviour using triangular encryption in NS2, 1st International conference on computational Intelligence (CIMTA-2013), pp 524–529, 2013

    Google Scholar 

  10. Liu S., Yang Y., Wang W.: Research of AODV routing protocol for ad hoc networks, AASRI conference on parallel and distributed computing and systems, 2013

    Google Scholar 

  11. Guo J., Marshal A., Zhou B: A New trust management framework for detecting malicious and selfish behaviour for mobile ad hoc networks, International joint conference of IEEE Trustcom -11, 2011

    Google Scholar 

  12. Sivagurunathan S, Prathapchandran K:Trust Based Security Model To Withstand Against Black Hole And Grey Hole Attacks In Military Based Mobile Ad Hoc Networks, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No. 1, February 2016

    Google Scholar 

  13. Hall S. and McQuay W.: Fundamental features of a unified trust model for distributed systems, in Proceedings of National Aerospace and Electronics Conference, Dayton, Ohio, July, 20–22, 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashish Kumar Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Jain, A.K., Tokekar, V., Shrivastava, S. (2018). Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks. In: Mishra, D., Azar, A., Joshi, A. (eds) Information and Communication Technology . Advances in Intelligent Systems and Computing, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-5508-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5508-9_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5507-2

  • Online ISBN: 978-981-10-5508-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics