Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic
Authors: Y. Harold Robinson, M. Rajaram, E. Golden Julie, S. Balaji
Abstract:
Mobile ad hoc network (MANET) is a self-configuring network of mobile node connected without wires. A Fuzzy Logic Based Collaborative watchdog approach is used to reduce the detection time of misbehaved nodes and increase the overall truthfulness. This methodology will increase the secure efficient routing by detecting the Black Holes attacks. The simulation results proved that this method improved the energy, reduced the delay and also improved the overall performance of the detecting black hole attacks in MANET.
Keywords: MANET, collaborative watchdog, fuzzy logic, AODV.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1125625
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1352References:
[1] Multi-Node Wireless Energy Charging in Sensor Networks, Liguang Xie, Member, IEEE, Yi Shi, Senior Member, IEEE, Y. Thomas Hou, Fellow, IEEE Wenjing Lou, IEEE, Hanif D. Sherali, and Scott F. Midkiff, April 2015.
[2] Harold Robinson, Y., & Rajaram, M. (2016), “A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network”, Wireless Personal Communications, 1–23, doi:10.1007/s11277-016-3213-0.
[3] Harold Robinson, Y., & Rajaram, M. (2015), “Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks”, The Scientific World Journal, 1–9. doi:10.1155/2015/284276.
[4] Y. T. Hou, Y. Shi, and H. D. Sherali, “Rate allocation and network lifetime problems for wireless sensor networks,” IEEE/ACM Trans. Netw., vol. 16, no. 2, pp. 321–334, Apr. 2008.
[5] Harold Robinson, Y., & Rajaram, M. (2015). “Trustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks”, World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol.9, no.2, 233–236.
[6] Kai Zeng, Wenjing Lou, Jie Yang, Donald R. Brown III, “On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks”, Springer, Mobile Networks Application (2007) 12:347–357, 2007.
[7] Sanjit Biswas, Robert Morris, “ExOR: opportunistic multi-hop routing for wireless networks”, Proceedings of conference on Applications, technologies, architectures, and protocols for computer communications, Pages 133-144, 2005
[8] A. Trivino-Cabrera, S. Canadas-Hurtado, “Survey on Opportunistic Routing in Multihop Wireless Networks”, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 3, No. 2, August 2011.
[9] Harold Robinson, Y., &Rajaram, M. (2015), “Establishing pairwise keys using key Predistribution schemes for sensor networks”, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 9, no.2, pp. 608–612.
[10] D. Boneh, D. Freeman, J. Katz, and B. Waters, “Signing a linear subspace: signature schemes for network coding,” in Proc. 2009 PKC, vol. 5443, pp. 68–87.
[11] B. Radunovic, C. Gkantsidis, P. Key, and P. Rodriguez:, “Toward practical opportunistic routing with intrasession network coding for mesh networks,” IEEE/ACM Trans. Networking, vol. 18, no. 2, pp. 420–433, 2010.
[12] Ehsan Ahvar, Mohammad Jalil Piran, “SELECTOR: An Intelligent Evaluation System for Routing Protocols in Wireless Ad Hoc and Sensor Networks”, Proceeding of 3rd International Conference on Electronics Computer Technology, ICECT 2011, IEEE, Kanyakumari, India, p.p. 300~305, April 8~10, 2011.