National Academy Science Letters

, Volume 41, Issue 1, pp 23–28 | Cite as

Fuzzy Based Detection of Malicious Activity for Security Assessment of MANET

  • Dhananjay Bisen
  • Sanjeev Sharma
Short Communication


Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation, congestion, energy constrained, variable capacity links and security. Due to security vulnerabilities and dynamic nature of network, wireless mobile ad-hoc networks may be unprotected against packet dropping attacks by any unauthorized node. This paper proposes fuzzy based secure architecture (FBSA) for mobile ad-hoc network in which node classification and detection of malicious activity is done through fuzzy detector. After detection of malicious activity, comparative study is performed on various parameters such as packet delivery ratio, average throughput, total packet forwarding and percentage of detection with variation in node speed.


MANET FIS Fuzzy logic AODV Packet dropping Malicious activity 


  1. 1.
    Murthy CSR, Manoj BS (2004) Ad hoc wireless networks: architecture and protocols. Pearson Ltd, BengaluruGoogle Scholar
  2. 2.
    Perkins CE (2001) Ad hoc networking. Addison-Wesley, BostonGoogle Scholar
  3. 3.
    Perkins CE, Royer EM (2003) Ad hoc on-demand distance vector routing (AODV), IETF RFC 3561Google Scholar
  4. 4.
    Ning P, Sun K (2005) How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw 3:795–819CrossRefGoogle Scholar
  5. 5.
    Anjum F, Mouchtaris P (2007) Security for wireless ad hoc networks. Wiley, New YorkCrossRefGoogle Scholar
  6. 6.
    Sen S, Clark JA (2008) Intrusion detection in mobile ad hoc networks. Springer, Berlin, pp 427–454Google Scholar
  7. 7.
    Nadeem A, Howarth M (2013) Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommun Syst 52(4):2047–2058CrossRefGoogle Scholar
  8. 8.
    Agarwal R, Guptaa R, Motwani M (2015) Performance optimisation through EPT-WBC in mobile ad hoc networks. Int J Electron. Google Scholar
  9. 9.
    Pastrana S, Mitrokotsa A, Orfila A, Peris-Lopez P (2012) Evaluation of classification algorithms for intrusion detection in MANETs. Knowl Based Syst 36:217–225CrossRefGoogle Scholar
  10. 10.
    Pi S, Baolin S (2012) Fuzzy controllers based multipath routing algorithm in MANET. Phys Procedia 24:1178–1185ADSCrossRefGoogle Scholar
  11. 11.
    Nie J, Wen J, Luo J, He X, Zhou Z (2006) An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks. Fuzzy Sets Syst 157:1704–1712MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Zadeh LA (1965) Fuzzy sets. Inf Control 8:338–353CrossRefzbMATHGoogle Scholar
  13. 13.
    Ross TJ (1995) Fuzzy logic with engineering application. Macgraw hills INc, New YorkzbMATHGoogle Scholar
  14. 14.
    Ghosh S, Razouqi Q, Schmacher HJ, Celmins A (1998) A survey of recent advances in fuzzy logic in telecommunications networks and new challenges. IEEE Trans Fuzzy Syst 6(8):443–447CrossRefGoogle Scholar
  15. 15.
    Lin J, Huang T, Zhao B (2008) A fast fuzzy set intrusion detection model. In: International symposium on knowledge acquisition and modeling, pp 601–605Google Scholar
  16. 16.
    Gomez J, Dasgupta D (2002) Evolving fuzzy classifiers for intrusion detection. In: Proceedings of IEEE workshop on information assurance United States Military Academy, NY, pp 321–323Google Scholar
  17. 17.
    Dua A, Kumar N, Bawa S (2014) A systematic review on routing protocols for vehicular ad hoc networks. Veh Commun 1:33–52CrossRefGoogle Scholar
  18. 18.
    The Network Simulator—NS-2:
  19. 19.
  20. 20.
    Huang Y, Lee W (2004) Attack analysis and detection for ad hoc routing protocols. In: Jonsson E et al (eds) Proceedings of the recent advances in intrusion detection, LNCS, vol 3224, pp 125–145Google Scholar
  21. 21.
    Mitrokotsa A, Tsagkaris M, Douligeris C (2008) Intrusion detection in mobile ad hoc networks using classification algorithms. In: Proceedings of the seventh annual mediterranean ad hoc networking workshop. Springer, pp 133–144Google Scholar

Copyright information

© The National Academy of Sciences, India 2017

Authors and Affiliations

  1. 1.School of Information TechnologyRGPVBhopalIndia

Personalised recommendations