{"title":"Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic","authors":"Y. Harold Robinson, M. Rajaram, E. Golden Julie, S. Balaji","volume":111,"journal":"International Journal of Computer and Information Engineering","pagesStart":622,"pagesEnd":629,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10004964","abstract":"
Mobile ad hoc network (MANET) is a self-configuring network of mobile node connected without wires. A Fuzzy Logic Based Collaborative watchdog approach is used to reduce the detection time of misbehaved nodes and increase the overall truthfulness. This methodology will increase the secure efficient routing by detecting the Black Holes attacks. The simulation results proved that this method improved the energy, reduced the delay and also improved the overall performance of the detecting black hole attacks in MANET.<\/p>\r\n","references":"[1]\tMulti-Node Wireless Energy Charging in Sensor Networks, Liguang Xie, Member, IEEE, Yi Shi, Senior Member, IEEE, Y. Thomas Hou, Fellow, IEEE Wenjing Lou, IEEE, Hanif D. Sherali, and Scott F. Midkiff, April 2015.\r\n[2]\tHarold Robinson, Y., & Rajaram, M. (2016), \u201cA memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network\u201d, Wireless Personal Communications, 1\u201323, doi:10.1007\/s11277-016-3213-0. \r\n[3]\tHarold Robinson, Y., & Rajaram, M. (2015), \u201cEnergy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks\u201d, The Scientific World Journal, 1\u20139. doi:10.1155\/2015\/284276.\r\n[4]\tY. T. Hou, Y. Shi, and H. D. Sherali, \u201cRate allocation and network lifetime problems for wireless sensor networks,\u201d IEEE\/ACM Trans. Netw., vol. 16, no. 2, pp. 321\u2013334, Apr. 2008.\r\n[5]\tHarold Robinson, Y., & Rajaram, M. (2015). \u201cTrustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks\u201d, World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol.9, no.2, 233\u2013236.\r\n[6]\tKai Zeng, Wenjing Lou, Jie Yang, Donald R. Brown III, \u201cOn Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks\u201d, Springer, Mobile Networks Application (2007) 12:347\u2013357, 2007.\t\r\n[7]\tSanjit Biswas, Robert Morris, \u201cExOR: opportunistic multi-hop routing for wireless networks\u201d, Proceedings of conference on Applications, technologies, architectures, and protocols for computer communications, Pages 133-144, 2005\r\n[8]\tA. Trivino-Cabrera, S. Canadas-Hurtado, \u201cSurvey on Opportunistic Routing in Multihop Wireless Networks\u201d, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 3, No. 2, August 2011.\r\n[9]\tHarold Robinson, Y., &Rajaram, M. (2015), \u201cEstablishing pairwise keys using key Predistribution schemes for sensor networks\u201d, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 9, no.2, pp. 608\u2013612.\r\n[10]\tD. Boneh, D. Freeman, J. Katz, and B. Waters, \u201cSigning a linear subspace: signature schemes for network coding,\u201d in Proc. 2009 PKC, vol. 5443, pp. 68\u201387.\r\n[11]\tB. Radunovic, C. Gkantsidis, P. Key, and P. Rodriguez:, \u201cToward practical opportunistic routing with intrasession network coding for mesh networks,\u201d IEEE\/ACM Trans. Networking, vol. 18, no. 2, pp. 420\u2013433, 2010.\r\n[12]\tEhsan Ahvar, Mohammad Jalil Piran, \u201cSELECTOR: An Intelligent Evaluation System for Routing Protocols in Wireless Ad Hoc and Sensor Networks\u201d, Proceeding of 3rd International Conference on Electronics Computer Technology, ICECT 2011, IEEE, Kanyakumari, India, p.p. 300~305, April 8~10, 2011.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 111, 2016"}