Mobile Networks and Applications

, Volume 24, Issue 2, pp 386–393 | Cite as

Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network

  • G. ArulkumaranEmail author
  • R. K. Gnanamurthy


Wireless communication technique is crucial during inaccessible disasters, military operation and natural climate adapt. Military application required secure way of data transmission and protect data from third party. However in Mobile Adhoc Network (MANET) due to dynamic topology the nodes are prone to a variety of security attacks like modifying the data, sniffing the information, inhibited by limited energy, computational power and bandwidth. Black hole attacks are one of the possible attacks in MANET. We propose fuzzy logic strategy to detect black hole attack based on certificate authority, energy auditing, packet veracity check and trust node to improve the performance of AODV. Fuzzy schema is a mathematical logic that attempts to work out problems by assigning the prediction values to an imprecise range of data. Fuzzy logic detect misbehaving node by giving certificate to only trusted node. The proposed technique is more secure and reliable in military data communication.


Military application Security attacks Fuzzy logic MANET 


  1. 1.
    Aliahmadipour L, Torra V, Eslami E (2017) On hesitant fuzzy clustering and clustering of hesitant fuzzy data. In: Torra V, Dahlbom A, Narukawa Y (eds) Fuzzy sets, rough sets, multisets and clustering. Studies in Computational Intelligence, vol 671. Springer, Cham.
  2. 2.
    Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. Cluster computing 20(2):1517–1525Google Scholar
  3. 3.
    Wang Y, Chen L (2017) Multi-view fuzzy clustering with minimax optimization for effective clustering of data from multiple sources. Expert Syst Appl 72:457–466Google Scholar
  4. 4.
    Valarmozhi A, Subala M, Muthu V (2012) Survey of wireless mesh network. International Journal of Engineering and Innovative Technology (IJEIT) 2(6)Google Scholar
  5. 5.
    Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in MANET. J Networks 3(5).
  6. 6.
    Sahu P, Bisoy SK, Sahoo S (2013) Detecting and isolating malicious node in AODV routing algorithm. Int J Comput Appl 66(16):0975–8887Google Scholar
  7. 7.
    Sheela D, Srividhya VR, Anjali AB, Chidanand GM (2012) Detecting black hole attacks in wireless sensor networks using mobile agent. International conference on artificial intelligence and embedded systems (ICAIES'2012), SingaporeGoogle Scholar
  8. 8.
    Sethi S, Udgata SK (2011) Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks. In: Sombattheera C, Agarwal A, Udgata SK, Lavangnananda K (eds) Multi-disciplinary trends in artificial intelligence. MIWAI 2011. Lecture Notes in Computer Science, vol 7080. Springer, Berlin, HeidelbergGoogle Scholar
  9. 9.
    Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. Information Security, IET 6, no. 2, Pp. 77–83Google Scholar
  10. 10.
    Xia H, Jia Z, Li X, Lei J, Sha EH-M (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114CrossRefGoogle Scholar
  11. 11.
    Krishna R, Mandal JK, Singh MM (2013) QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack. Procedia Technol 10:530–537CrossRefGoogle Scholar
  12. 12.
    Biswas, S, Nag T, Neogy S (2014) Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. Conference: 2014 Applications and Innovations in Mobile Computing (AIMoC).
  13. 13.
    Khamayseh Y, Bader A, Mardini W, Bani Yasein M (2011) A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks. International Journal of Communication Networks and Information Security 3(1):36Google Scholar
  14. 14.
    Raj PN, Swadesh PB (2009) DPRAODV: a dynamic learning system against Blackhole attack in AODV based MANET. Int J Comput Sci 2:54–59.Google Scholar
  15. 15.
    Gayatri V, Gomathi C (2012) Electing monitoring node through fuzzy theory in wireless mesh network for defense against selective forwarding attack. Int J Comput Eng volume 02– no. 2, issue: 02Google Scholar
  16. 16.
    Gnanamurthy RK, Malathi L (2012) A novel routing protocol with lifetime maximizing clustering algorithm for WSN India conference (INDICON), (2012) annual IEEE925-930Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.AP / IT, Vivekanandha College of Engineering for Women (Autonomous)TiruchengodeIndia
  2. 2.DirectorPPG Institute of TechnologyCoimbatoreIndia

Personalised recommendations