SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
Black Hole Attack Detection using Fuzzy Logic
Sonal1
, Kiran Narang2
1, 2
Hindu College of Engineering, Sonepat, Haryana, India
Abstract: MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to
number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of
attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are
providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well
as provide the solution to reduce data loss over network.
Keywords: MANET, Fuzzy logic, Black hole attack , Packet loss, Data rate.
1. Introduction
Mobile Ad hoc NETworks (MANET) are the wireless
networks of mobile computing devices without any support
of a fixed infrastructure. The mobile nodes in a MANET self
organize together in some arbitrary fashion. A MANET is an
autonomous collection of mobile users that communicate
over relatively bandwidth constrained wireless links. Since
the nodes are mobile, the network topology may change
rapidly and unpredictably over time. These networks can be
applied between persons or between vehicles in areas which
are depleted of fixed infrastructure. Two nodes can directly
communicate with each other if they are within the radio
range. If the nodes are not within the radio range they can
communicate with each other using multi hop routing. The
wireless link between the nodes in mobile networks is highly
vulnerable. This is because nodes can continuously move
causing the frequent breakage of the link. The power
available for transmission is also strictly limited. The
topology of the network is highly dynamic due to the
continuous breakage and establishment of wireless link
Nodes continuously move into and out of the radio range.
This gives rise to the change in routing information. The
network is decentralized; where all network activity
including discovering the topology and delivering messages
must be executed by the nodes themselves i.e. routing
functionality will be incorporated into mobile nodes.
MANET is more vulnerable than wired network due to
mobile nodes, threats from malicious nodes inside the
network. Because of vulnerabilities, MANET is more prone
to malicious attacks. MANET has following vulnerabilities.
 Lack of centralized node: MANET doesn’t have a
centralized node. The lack of centralized makes the
detection of attacks difficult because it is not east to
monitor the traffic in a highly dynamic and large scale ad-
hoc network.
 Resource availability: Resource availability is a major
issue in MANET. Providing secure communication in
such changing environment as well as protection against
specific threats and attacks, leads to development of
various security schemes and architectures. Collaborative
ad-hoc environments also allow implementation of self-
organized security mechanism.
 Scalability: Due to mobility of nodes, scale of ad-hoc
network changing all the time. So scalability is a major
issue concerning security. Security mechanism should be
capable of handling a large network as well as small ones.
 Dynamic topology: Dynamic topology and changeable
nodes membership may disturb the trust relationship
among nodes. The trust may also be disturbed if some
nodes are detected as compromised. This dynamic
behavior could be better protected with distributed and
adaptive security mechanisms.
 Limited power supply: The nodes in mobile ad-hoc
network need to consider restricted power supply, which
will cause several problems. A node in mobile ad-hoc
network may behave in a selfish manner when it is finding
that there is only limited power supply.
 Bandwidth constraint: Variable low capacity links exists
as compared to wireless network which are more
susceptible to external noise, interference and signal
attenuation effects.
 Adversary inside the Network: The mobile nodes within
the MANET can freely join and leave the network. The
nodes within network may also behave maliciously. This
is hard to detect that the behavior of the node is malicious.
Thus this attack is more dangerous than the external
attack. These nodes are called compromised nodes.
 No predefined Boundary: In mobile ad- hoc networks we
cannot precisely define a physical boundary of the
network. The nodes work in a nomadic environment
where they are allowed to join and leave the wireless
network. As soon as an adversary comes in the radio range
of a node it will be able to communicate with that node.
2. Black hole attack in MANET
Attacks on MANETs can be divided into two categories,
passive and active attacks. An active attack alters the
operation of networks by modifying and interrupting data. A
passive attack does not disturb the operation of networks.
In black hole attack, black hole node acts like black hole in
the universe. In this attack black hole node absorbs all the
Here we assume that if nodes are in their vicinity, they can
traffic towards itself and doesn't forward to other nodes.
Whenever, source node wants to send packet to the
destination important issue. To attract all the packet towards
it, this malicious node advertise that it has shortest path
through it to the destination node. Two types of black hole
attack can be described in order to distinguish the kind of
black hole Attack
222
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
2.1 Internal Black hole attack
This type of black hole attack has an internal malicious node
which fits in between the routes of given source and
destination. As soon as it gets the chance this malicious node
make itself an active data route element. At this stage it is
now capable of conducting attack with the start of data
transmission. This is an internal attack because node itself
belongs to the data route. Internal attack is more vulnerable
to defend against because of difficulty in detecting the
internal misbehaving node.
2.2 External Black hole attack
External attacks physically stay outside of the network and
deny access to network traffic or creating congestion in
network or by disrupting the entire network. External attack
can become a kind of internal attack when it take control of
internal malicious node and control it to attack other nodes
in MANET.
External black hole attack can be summarized in following
points
1.Malicious node detects the active route and notes the
destination address.
2.Malicious node sends a route reply packet (RREP)
including the destination address field spoofed to an
unknown destination address. Hop count value is set to
lowest values and the sequence number is set to the
highest value.
3.Malicious node send RREP to the nearest available node
which belongs to the active route. This can also be send
directly to the data source node if route is available.
4.The RREP received by the nearest available node to the
malicious node will relayed via the established inverse
route to the data of source node.
5.The new information received in the route reply will allow
the source node to update its routing table.
6.New route selected by source node for selecting data.
7.The malicious node will drop now all the data to which it
belong in the route
3. Routing in MANETS with and without
Black hole Node
Generally routing in MANET is done either by table driven
routing protocol or ad hoc on demand distance vector
routing protocol. In case of table driven process, each and
every node in MANETs maintains some up-to-date
information about the network. Every node has the
information about latest network topology, any changes
happened to the network is generally propagated to the
network, accordingly node updates their routing table .But
this kind of protocol creates several problems to the network
in terms of bandwidth overhead, wastage of battery power of
the nodes, entry of unnecessary redundant route etc. Due to
these difficulties, ad hoc on demand distance vector (AODV)
routing protocol is preferred. In this protocol, routing tables
are dynamically created when needed. So, whenever source
node wants to send data to destination, it tries to establish the
path through several ways by sending some RREQ packets.
When destination sends a RREP packet to source through
shortest path, the source sends data through this path.
Though it looks very simple, but this kind of protocol suffers
from several vulnerabilities of attack. If the path cannot be
established then RERR messages is generated. AODV
protocol is very much acquainted with dynamic network
condition, low processing and memory overleaf, less
bandwidth wastage with small control messages. Due to
these kinds of reasons AODV becomes one of the most
popular protocols in MANETs. Whenever a RREQ packet is
generated by the source, every node that receives the RREQ
packet will check whether this packet is meant for them or
not. If so, immediately they will generate RREP message,
otherwise every node tries to forward the packet to their
neighbor to reach destination, if their routing table doesn’t
contain valid entry to destination. If the routing table
contains valid entry to destination then next step is to check
the destination sequence number. Usually destination
sequence number is maintained by every node. Its value
depends on network traffic and participation of node in
packet forwarding. If the destination sequence number is
same for more than one RREP then it goes for the specific
path where number of hops to reach destination is lesser.
Thus higher the sequence number implies the fresh route to
destination. In case if the source receives multiple RREP
then it decides the path where sequence number is higher
4. Literature Survey
Monita Wahengbam, Ningrinla Marchang [1] performed a
work on “Intrusion Detection in MANET using the Fuzzy
Logic”.Fuzzy rule is implemenating during the analysis
phase to detect the misbehavior over the network. The work
will analyze the traffic over a node and take a fuzzy decision
regarding the node reliability. The parameters in paper are
number of successful data transmitted over the node, number
of packets lost. Elmar Gerhards-Padilla, Marko Jahnke
et.al[2]performed a work,” Detecting Black Hole Attacks in
Tactical MANETs using Topology Graphs”. In this work
Author present TOGBAD a new centralised approach, using
topology graphs to identify nodes attempting to create a
black hole. Author use well-established techniques to gain
knowledge about the network topology and use this
knowledge to perform plausibility checks of the routing
information propagated by the nodes in the network.
Latha Tamilselvan, Dr. V Sankaranarayanan et.al [4]
“Prevention of Co-operative Black Hole Attack in MANET”
gave an approach to combat the Black hole attack. In
MANET, the absence of a fixed infrastructure, thus nodes
have to cooperate in order to provide the necessary network
functionality. One of the principal routing protocols used in
Ad hoc networks is AODV (Ad hoc on demand Distance
Vector) protocol. The security of the AODV protocol is
compromised by a particular type of attack called ‘Black
Hole’ attack .In this attack a malicious node advertises itself
as having the shortest path to the node whose packets it
wants to intercept. To reduce the probability it is proposed to
wait and check the replies from all the neighboring nodes to
find a safe route. Their approach to combat the Black hole
attack is to make use of a ‘Fidelity Table’ wherein every
participating node will be assigned a fidelity level that acts
as a measure of reliability of that node. In case the level of
any node drops to 0, it is considered to be a malicious node,
223
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
termed as a ‘Black hole’ and is eliminated. The percentage
of packets received through our system is better than that in
AODV in presence of cooperative black hole attack. The
solution is simulated using the Global Sensor Simulator and
is found to achieve the required security with minimal delay
& overhead.
Rajib Das, Dr. Bipul Syam Purkayastha et.al [6] performed a
work,” Security Measures for Black Hole Attack in
MANET: An Approach”. In this paper, Author give an
algorithmic approach to focus on analyzing and improving
the security of AODV, which is one of the popular routing
protocols for MANET. Presented aim is on ensuring the
security against Black hole attack. The proposed solution is
capable of detecting & removing Black hole node in the
MANET at the beginning.
Jathe S.R, Dakhane D.M. [7] performed a work,” A Review
Paper on Black Hole Attack and Comparison of Different
Black Hole Attack Techniques”. Communicating without a
network infrastructure. Due to security vulnerabilities of the
routing protocols, however, wireless ad hoc networks may
be unprotected against attacks by the malicious nodes. In this
paper Author studied the details about black hole attack, and
comparison of different black hole attack techniques.
Rashid Sheikhl, Mahakal Singh Chande et.al [8] gave a
paper on “Security Issues in MANET: A Review” In the
paper author described security issues like No predefmed
Boundary, Adversary inside the Network, Changing scale
etc.and security criteria.Also explaned the intrusion detection
systems and Privacy- preservation in MANET using Secure
Multiparty Computation solution .
Ochola EO, Eloff MM [9] performed a work, ”A Review of
Black Hole Attack on AODV Routing in MANET”. Black
Hole attacks are launched by participating malicious nodes
that agree to forward data packets to destination but
eavesdrop or drop the packets intentionally, which not only
compromise the network, but also degrade network
performance. Routing protocols, which act as the binding
force in these networks, are a common target of these nodes.
The route updates are shared not on a periodic but on an as
requirement basis. The control packets create a potential
vulnerability that is frequently exploited by malicious nodes.
The paper further analyses the impact of Black Hole attack
in AODV performance.
5. Purposed Work and Methodology
Mobile Ad-Hoc network is one of most common ad-hoc
network with lot of problems related to congestion and
routing. We are providing one of the solutions to secure the
transmission over the network. Security aspects play an
important role in almost all of the application scenarios
given the vulnerabilities inherent in wireless ad hoc
networking from the very fact that radio communication
takes place (e.g. in tactical applications) to routing, man-in-
the-middle and elaborate data injection attacks. Security has
become a primary concern in order to provide protected
communication between mobile nodes in a hostile
environment. The proposed system is about to design an
intrusion detection system to detect the black hole attack on
MANET This detection system is based on FUZZY LOGIC.
We propose an IDS system in which improvement is by
making use of two factors i.e. Packet Loss rate, Data Rate.
We will use both factors using Fuzzy logic which is problem
solving control system .Fuzzy logic provides a simple way to
arrive at a definite conclusion based upon vague, ambiguous,
noisy or missing information. We proposed an algorithm
which is based on above factors .In this algorithm firstly we
define the network with N number of nodes and we set
source node to S and destination node D and after that we we
let current node is as source node .we repeat the steps until
current node is not equal to destination node. In this now we
find the list of neighboring nodes of current node. We
identify the parameter s of each neighbor node i.e. packet
loss, data rate. In this purposed algorithm we use the concept
of Priority, only high priority nodes take part in
communication. For priority we define the three steps at
sender side.
Step 1: Packet loss is low and data rate is high then priority
is high.
Step 2: Packet loss is medium and data rate is high then
priority is medium.
Step 3: Packet loss is low and data rate is low then priority is
low.
We set priority at receiver side also when the energy of any
node is low then set the priority of node is low and node do
not take part in communication. We increase the priority of
node that they take part in communication. We are providing
the condition Data Transmitted from the node is greater than
THRESHOLD and Rate of node is also greater than
THRESHOLD then increase the level of priority.
5.1 Algorithm to Detect Black Hole
1. Define a Network with N number of nodes
2. Define the Source Node S and Destination Node D
3. Set CurNode=S as Current Node
4. While CurNode <> DestNode
a. [Repeat Steps 5 to 40]
5. Identify the list of neighbouring nodes to CurNode called
Ne(1),Ne(2)…..Ne(M)
6. For i=1 to M
7. {
8. Idenitfy the Analysis parameter for Each Neighbour called
PacketLossrate, DataRate
9. [Sender End Fuzzy Logic]
10. Fuzzify these rules under the fuzzification process
11. If ( Fuzzy(PacketLossrate(Ne(i)),Low) and
Fuzzy(DataRate(Ne(i)),High)
12. {
13. Set Priority(Ne(i))=High
14. }
15. Else If ( Fuzzy(PacketLossrate(Ne(i)),Medium) and
Fuzzy(DataRate(Ne(i)),Medium)
16. {
17. Set Priority(Ne(i))=Medium
18. }
19. Else If ( Fuzzy(PacketLossrate(Ne(i)),Low) and
Fuzzy(DataRate(Ne(i)),Low)
20. {
21. Set Priority(Ne(i))=Low.(black hole node found)
224
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
22. }
23. }
24. Find the List of High Priority Recievers from the
Neighbor List called P(1),P(2)….P(K)
25. [Receiver level Fuzzy Logic]
26. For i=1 to K
27. {
28. If(Energy(P(i))=Low )
29. {
30. Set Priority (P(i))=Low
31. }
32. If(DataTransmitted(P(i))>THRESHOLD and
Rate(P(i))>THRESHOLD)
33. {
34. Set Priority(P(i))=priority(P(i))+1
35. }
36. }
37.
38. Find the Node with Max Priority called Node p
39. Set CurNode=p
40. }
6.Conclusion
The purposed algorithm will provide the solution of packet
loss and data rate against the black hole attack in network.
The purposed work will firstly detect the black hole attack
using the fuzzy logic. The fuzzy logic is implemented on
packet loss and data rate at time of node communication.
Now in this it will send the packet from surrounding nodes.
This algorithm will provide the better solution.
7.Acknowledgment
I would like to give my sincere gratitude to my guide Ms.
Kiran Narang who guided me throughout, to complete this
topic.
References
[1] Monita Wahengbam,” Intrusion Detection in MANET
using Fuzzy Logic”, 978-1-4577-0748-3/12/$26.00 ©
2012 IEEE
[2] Elmar Gerhards-Padilla,” Detecting Black Hole Attacks
in Tactical MANETs using Topology Graphs”, 32nd
IEEE Conference on Local Computer Networks 0742-
1303/07© 2007 IEEE
[3] Sanjay Ramaswamy Huirong Fu” Prevention of
Cooperative Black Hole Attack in Wireless Ad Hoc
Networks
[4] Latha Tamilselvan “Prevention of Co-operative Black
Hole Attack in MANET” JOURNAL OF NETWORKS,
VOL. 3, NO. 5, MAY 2008
[5] K.Selvavinayaki, K.K.Shyam Shankar” “Security
Enhanced DSR Protocol to Prevent Black Hole Attacks
in MANET”International Journal of Computer
Applications (0975-8887).volume7-volume11, October
2010.
[6] Rajib Das,” Security Measures for Black Hole Attack in
MANET: An Approach”, International Journal of
Engineering Science and Technology (IJEST) ISSN :
0975-5462
[7] Jathe S.R, Dakhane D.M ,” A Review Paper on Black
Hole Attack and Comparison of Different Black Hole
Attack Techniques “International Journal of
Cryptography and Security ISSN: 2249-7013 & E-
ISSN: 2249-7021
[8] Rashid Sheikhl, Mahakal Singh Chande et.al [8] gave a
paper on “Security Issues in MANET: Review” 978-1-
4244-7202-4/10/$26.00 ©2010 IEEE
[9] Ochola EO,” A Review of Black Hole Attack on AODV
Routing in MANET
[10]Isaac Woungang,,” Detecting Blackhole Attacks on
DSR-based Mobile Ad Hoc Networks”, 978-1-4673-
1550-0/12/$31.00 ©2012 IEEE
Author Profile
Ms. Kiran Narang is presently working as Assistant Professor in
Hindu College of Engineering, Sonepat. She posses qualifications
of B.Tech, M.Tech. She has been published many papers in
National/ International journals and holds a teaching experience of
approximate 10 years. Her research areas are in Wireless Networks,
Computer Architecture and Data Structure.
Ms. Sonal has completed her B.Tech degree in Computer Science
from Maharishi Dayanand University, Rohtak in year 2011. She is
pursuing Hindu College of Engineering, Sonepat from 2011. Her
research interests are in Mobile ad hoc networks and computer
networks.
225

Mais conteúdo relacionado

Mais procurados

Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetijwmn
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 

Mais procurados (18)

Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
N0363079085
N0363079085N0363079085
N0363079085
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manet
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 

Destaque

New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection Systemijsrd.com
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesIAEME Publication
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETSPooja Kundu
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representationSravanthi Emani
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence Muhammad Ahad
 
Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence Yasir Khan
 
Knowledge representation in AI
Knowledge representation in AIKnowledge representation in AI
Knowledge representation in AIVishal Singh
 

Destaque (11)

New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection System
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representation
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence
 
Knowledge representation in AI
Knowledge representation in AIKnowledge representation in AI
Knowledge representation in AI
 

Semelhante a Black Hole Attack Detection using Fuzzy Logic

An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONijscai
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
 
Iss 2
Iss 2Iss 2
Iss 2ijgca
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manetINFOGAIN PUBLICATION
 
Review of black hole and grey hole attack
Review of black hole and grey hole attackReview of black hole and grey hole attack
Review of black hole and grey hole attackijma
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 

Semelhante a Black Hole Attack Detection using Fuzzy Logic (20)

Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTION
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
Iss 2
Iss 2Iss 2
Iss 2
 
Iss3
Iss3Iss3
Iss3
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manet
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
Review of black hole and grey hole attack
Review of black hole and grey hole attackReview of black hole and grey hole attack
Review of black hole and grey hole attack
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 

Mais de International Journal of Science and Research (IJSR)

Mais de International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Ad hoc networks technical issues on radio links security &amp; qo s
Ad hoc networks technical issues on radio links security &amp; qo sAd hoc networks technical issues on radio links security &amp; qo s
Ad hoc networks technical issues on radio links security &amp; qo s
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 

Último

Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 

Último (20)

Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 

Black Hole Attack Detection using Fuzzy Logic

  • 1. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net Black Hole Attack Detection using Fuzzy Logic Sonal1 , Kiran Narang2 1, 2 Hindu College of Engineering, Sonepat, Haryana, India Abstract: MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network. Keywords: MANET, Fuzzy logic, Black hole attack , Packet loss, Data rate. 1. Introduction Mobile Ad hoc NETworks (MANET) are the wireless networks of mobile computing devices without any support of a fixed infrastructure. The mobile nodes in a MANET self organize together in some arbitrary fashion. A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. These networks can be applied between persons or between vehicles in areas which are depleted of fixed infrastructure. Two nodes can directly communicate with each other if they are within the radio range. If the nodes are not within the radio range they can communicate with each other using multi hop routing. The wireless link between the nodes in mobile networks is highly vulnerable. This is because nodes can continuously move causing the frequent breakage of the link. The power available for transmission is also strictly limited. The topology of the network is highly dynamic due to the continuous breakage and establishment of wireless link Nodes continuously move into and out of the radio range. This gives rise to the change in routing information. The network is decentralized; where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves i.e. routing functionality will be incorporated into mobile nodes. MANET is more vulnerable than wired network due to mobile nodes, threats from malicious nodes inside the network. Because of vulnerabilities, MANET is more prone to malicious attacks. MANET has following vulnerabilities.  Lack of centralized node: MANET doesn’t have a centralized node. The lack of centralized makes the detection of attacks difficult because it is not east to monitor the traffic in a highly dynamic and large scale ad- hoc network.  Resource availability: Resource availability is a major issue in MANET. Providing secure communication in such changing environment as well as protection against specific threats and attacks, leads to development of various security schemes and architectures. Collaborative ad-hoc environments also allow implementation of self- organized security mechanism.  Scalability: Due to mobility of nodes, scale of ad-hoc network changing all the time. So scalability is a major issue concerning security. Security mechanism should be capable of handling a large network as well as small ones.  Dynamic topology: Dynamic topology and changeable nodes membership may disturb the trust relationship among nodes. The trust may also be disturbed if some nodes are detected as compromised. This dynamic behavior could be better protected with distributed and adaptive security mechanisms.  Limited power supply: The nodes in mobile ad-hoc network need to consider restricted power supply, which will cause several problems. A node in mobile ad-hoc network may behave in a selfish manner when it is finding that there is only limited power supply.  Bandwidth constraint: Variable low capacity links exists as compared to wireless network which are more susceptible to external noise, interference and signal attenuation effects.  Adversary inside the Network: The mobile nodes within the MANET can freely join and leave the network. The nodes within network may also behave maliciously. This is hard to detect that the behavior of the node is malicious. Thus this attack is more dangerous than the external attack. These nodes are called compromised nodes.  No predefined Boundary: In mobile ad- hoc networks we cannot precisely define a physical boundary of the network. The nodes work in a nomadic environment where they are allowed to join and leave the wireless network. As soon as an adversary comes in the radio range of a node it will be able to communicate with that node. 2. Black hole attack in MANET Attacks on MANETs can be divided into two categories, passive and active attacks. An active attack alters the operation of networks by modifying and interrupting data. A passive attack does not disturb the operation of networks. In black hole attack, black hole node acts like black hole in the universe. In this attack black hole node absorbs all the Here we assume that if nodes are in their vicinity, they can traffic towards itself and doesn't forward to other nodes. Whenever, source node wants to send packet to the destination important issue. To attract all the packet towards it, this malicious node advertise that it has shortest path through it to the destination node. Two types of black hole attack can be described in order to distinguish the kind of black hole Attack 222
  • 2. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net 2.1 Internal Black hole attack This type of black hole attack has an internal malicious node which fits in between the routes of given source and destination. As soon as it gets the chance this malicious node make itself an active data route element. At this stage it is now capable of conducting attack with the start of data transmission. This is an internal attack because node itself belongs to the data route. Internal attack is more vulnerable to defend against because of difficulty in detecting the internal misbehaving node. 2.2 External Black hole attack External attacks physically stay outside of the network and deny access to network traffic or creating congestion in network or by disrupting the entire network. External attack can become a kind of internal attack when it take control of internal malicious node and control it to attack other nodes in MANET. External black hole attack can be summarized in following points 1.Malicious node detects the active route and notes the destination address. 2.Malicious node sends a route reply packet (RREP) including the destination address field spoofed to an unknown destination address. Hop count value is set to lowest values and the sequence number is set to the highest value. 3.Malicious node send RREP to the nearest available node which belongs to the active route. This can also be send directly to the data source node if route is available. 4.The RREP received by the nearest available node to the malicious node will relayed via the established inverse route to the data of source node. 5.The new information received in the route reply will allow the source node to update its routing table. 6.New route selected by source node for selecting data. 7.The malicious node will drop now all the data to which it belong in the route 3. Routing in MANETS with and without Black hole Node Generally routing in MANET is done either by table driven routing protocol or ad hoc on demand distance vector routing protocol. In case of table driven process, each and every node in MANETs maintains some up-to-date information about the network. Every node has the information about latest network topology, any changes happened to the network is generally propagated to the network, accordingly node updates their routing table .But this kind of protocol creates several problems to the network in terms of bandwidth overhead, wastage of battery power of the nodes, entry of unnecessary redundant route etc. Due to these difficulties, ad hoc on demand distance vector (AODV) routing protocol is preferred. In this protocol, routing tables are dynamically created when needed. So, whenever source node wants to send data to destination, it tries to establish the path through several ways by sending some RREQ packets. When destination sends a RREP packet to source through shortest path, the source sends data through this path. Though it looks very simple, but this kind of protocol suffers from several vulnerabilities of attack. If the path cannot be established then RERR messages is generated. AODV protocol is very much acquainted with dynamic network condition, low processing and memory overleaf, less bandwidth wastage with small control messages. Due to these kinds of reasons AODV becomes one of the most popular protocols in MANETs. Whenever a RREQ packet is generated by the source, every node that receives the RREQ packet will check whether this packet is meant for them or not. If so, immediately they will generate RREP message, otherwise every node tries to forward the packet to their neighbor to reach destination, if their routing table doesn’t contain valid entry to destination. If the routing table contains valid entry to destination then next step is to check the destination sequence number. Usually destination sequence number is maintained by every node. Its value depends on network traffic and participation of node in packet forwarding. If the destination sequence number is same for more than one RREP then it goes for the specific path where number of hops to reach destination is lesser. Thus higher the sequence number implies the fresh route to destination. In case if the source receives multiple RREP then it decides the path where sequence number is higher 4. Literature Survey Monita Wahengbam, Ningrinla Marchang [1] performed a work on “Intrusion Detection in MANET using the Fuzzy Logic”.Fuzzy rule is implemenating during the analysis phase to detect the misbehavior over the network. The work will analyze the traffic over a node and take a fuzzy decision regarding the node reliability. The parameters in paper are number of successful data transmitted over the node, number of packets lost. Elmar Gerhards-Padilla, Marko Jahnke et.al[2]performed a work,” Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs”. In this work Author present TOGBAD a new centralised approach, using topology graphs to identify nodes attempting to create a black hole. Author use well-established techniques to gain knowledge about the network topology and use this knowledge to perform plausibility checks of the routing information propagated by the nodes in the network. Latha Tamilselvan, Dr. V Sankaranarayanan et.al [4] “Prevention of Co-operative Black Hole Attack in MANET” gave an approach to combat the Black hole attack. In MANET, the absence of a fixed infrastructure, thus nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc on demand Distance Vector) protocol. The security of the AODV protocol is compromised by a particular type of attack called ‘Black Hole’ attack .In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. Their approach to combat the Black hole attack is to make use of a ‘Fidelity Table’ wherein every participating node will be assigned a fidelity level that acts as a measure of reliability of that node. In case the level of any node drops to 0, it is considered to be a malicious node, 223
  • 3. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net termed as a ‘Black hole’ and is eliminated. The percentage of packets received through our system is better than that in AODV in presence of cooperative black hole attack. The solution is simulated using the Global Sensor Simulator and is found to achieve the required security with minimal delay & overhead. Rajib Das, Dr. Bipul Syam Purkayastha et.al [6] performed a work,” Security Measures for Black Hole Attack in MANET: An Approach”. In this paper, Author give an algorithmic approach to focus on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Presented aim is on ensuring the security against Black hole attack. The proposed solution is capable of detecting & removing Black hole node in the MANET at the beginning. Jathe S.R, Dakhane D.M. [7] performed a work,” A Review Paper on Black Hole Attack and Comparison of Different Black Hole Attack Techniques”. Communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. In this paper Author studied the details about black hole attack, and comparison of different black hole attack techniques. Rashid Sheikhl, Mahakal Singh Chande et.al [8] gave a paper on “Security Issues in MANET: A Review” In the paper author described security issues like No predefmed Boundary, Adversary inside the Network, Changing scale etc.and security criteria.Also explaned the intrusion detection systems and Privacy- preservation in MANET using Secure Multiparty Computation solution . Ochola EO, Eloff MM [9] performed a work, ”A Review of Black Hole Attack on AODV Routing in MANET”. Black Hole attacks are launched by participating malicious nodes that agree to forward data packets to destination but eavesdrop or drop the packets intentionally, which not only compromise the network, but also degrade network performance. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. The route updates are shared not on a periodic but on an as requirement basis. The control packets create a potential vulnerability that is frequently exploited by malicious nodes. The paper further analyses the impact of Black Hole attack in AODV performance. 5. Purposed Work and Methodology Mobile Ad-Hoc network is one of most common ad-hoc network with lot of problems related to congestion and routing. We are providing one of the solutions to secure the transmission over the network. Security aspects play an important role in almost all of the application scenarios given the vulnerabilities inherent in wireless ad hoc networking from the very fact that radio communication takes place (e.g. in tactical applications) to routing, man-in- the-middle and elaborate data injection attacks. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The proposed system is about to design an intrusion detection system to detect the black hole attack on MANET This detection system is based on FUZZY LOGIC. We propose an IDS system in which improvement is by making use of two factors i.e. Packet Loss rate, Data Rate. We will use both factors using Fuzzy logic which is problem solving control system .Fuzzy logic provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, noisy or missing information. We proposed an algorithm which is based on above factors .In this algorithm firstly we define the network with N number of nodes and we set source node to S and destination node D and after that we we let current node is as source node .we repeat the steps until current node is not equal to destination node. In this now we find the list of neighboring nodes of current node. We identify the parameter s of each neighbor node i.e. packet loss, data rate. In this purposed algorithm we use the concept of Priority, only high priority nodes take part in communication. For priority we define the three steps at sender side. Step 1: Packet loss is low and data rate is high then priority is high. Step 2: Packet loss is medium and data rate is high then priority is medium. Step 3: Packet loss is low and data rate is low then priority is low. We set priority at receiver side also when the energy of any node is low then set the priority of node is low and node do not take part in communication. We increase the priority of node that they take part in communication. We are providing the condition Data Transmitted from the node is greater than THRESHOLD and Rate of node is also greater than THRESHOLD then increase the level of priority. 5.1 Algorithm to Detect Black Hole 1. Define a Network with N number of nodes 2. Define the Source Node S and Destination Node D 3. Set CurNode=S as Current Node 4. While CurNode <> DestNode a. [Repeat Steps 5 to 40] 5. Identify the list of neighbouring nodes to CurNode called Ne(1),Ne(2)…..Ne(M) 6. For i=1 to M 7. { 8. Idenitfy the Analysis parameter for Each Neighbour called PacketLossrate, DataRate 9. [Sender End Fuzzy Logic] 10. Fuzzify these rules under the fuzzification process 11. If ( Fuzzy(PacketLossrate(Ne(i)),Low) and Fuzzy(DataRate(Ne(i)),High) 12. { 13. Set Priority(Ne(i))=High 14. } 15. Else If ( Fuzzy(PacketLossrate(Ne(i)),Medium) and Fuzzy(DataRate(Ne(i)),Medium) 16. { 17. Set Priority(Ne(i))=Medium 18. } 19. Else If ( Fuzzy(PacketLossrate(Ne(i)),Low) and Fuzzy(DataRate(Ne(i)),Low) 20. { 21. Set Priority(Ne(i))=Low.(black hole node found) 224
  • 4. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net 22. } 23. } 24. Find the List of High Priority Recievers from the Neighbor List called P(1),P(2)….P(K) 25. [Receiver level Fuzzy Logic] 26. For i=1 to K 27. { 28. If(Energy(P(i))=Low ) 29. { 30. Set Priority (P(i))=Low 31. } 32. If(DataTransmitted(P(i))>THRESHOLD and Rate(P(i))>THRESHOLD) 33. { 34. Set Priority(P(i))=priority(P(i))+1 35. } 36. } 37. 38. Find the Node with Max Priority called Node p 39. Set CurNode=p 40. } 6.Conclusion The purposed algorithm will provide the solution of packet loss and data rate against the black hole attack in network. The purposed work will firstly detect the black hole attack using the fuzzy logic. The fuzzy logic is implemented on packet loss and data rate at time of node communication. Now in this it will send the packet from surrounding nodes. This algorithm will provide the better solution. 7.Acknowledgment I would like to give my sincere gratitude to my guide Ms. Kiran Narang who guided me throughout, to complete this topic. References [1] Monita Wahengbam,” Intrusion Detection in MANET using Fuzzy Logic”, 978-1-4577-0748-3/12/$26.00 © 2012 IEEE [2] Elmar Gerhards-Padilla,” Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs”, 32nd IEEE Conference on Local Computer Networks 0742- 1303/07© 2007 IEEE [3] Sanjay Ramaswamy Huirong Fu” Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks [4] Latha Tamilselvan “Prevention of Co-operative Black Hole Attack in MANET” JOURNAL OF NETWORKS, VOL. 3, NO. 5, MAY 2008 [5] K.Selvavinayaki, K.K.Shyam Shankar” “Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANET”International Journal of Computer Applications (0975-8887).volume7-volume11, October 2010. [6] Rajib Das,” Security Measures for Black Hole Attack in MANET: An Approach”, International Journal of Engineering Science and Technology (IJEST) ISSN : 0975-5462 [7] Jathe S.R, Dakhane D.M ,” A Review Paper on Black Hole Attack and Comparison of Different Black Hole Attack Techniques “International Journal of Cryptography and Security ISSN: 2249-7013 & E- ISSN: 2249-7021 [8] Rashid Sheikhl, Mahakal Singh Chande et.al [8] gave a paper on “Security Issues in MANET: Review” 978-1- 4244-7202-4/10/$26.00 ©2010 IEEE [9] Ochola EO,” A Review of Black Hole Attack on AODV Routing in MANET [10]Isaac Woungang,,” Detecting Blackhole Attacks on DSR-based Mobile Ad Hoc Networks”, 978-1-4673- 1550-0/12/$31.00 ©2012 IEEE Author Profile Ms. Kiran Narang is presently working as Assistant Professor in Hindu College of Engineering, Sonepat. She posses qualifications of B.Tech, M.Tech. She has been published many papers in National/ International journals and holds a teaching experience of approximate 10 years. Her research areas are in Wireless Networks, Computer Architecture and Data Structure. Ms. Sonal has completed her B.Tech degree in Computer Science from Maharishi Dayanand University, Rohtak in year 2011. She is pursuing Hindu College of Engineering, Sonepat from 2011. Her research interests are in Mobile ad hoc networks and computer networks. 225