Advertisement

Fuzzy Logic Based Packet Dropping Detection Approach for Mobile Ad-Hoc Wireless Network

  • Sheevendra SinghEmail author
  • Isha Sharma
  • Praneet SaurabhEmail author
  • Ritu Prasad
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1057)

Abstract

Mobile ad hoc network (MANET) is a lively network that is self configuring in nature because of its mobility characteristics. MANET plays an important role in situations where fixed wired pre-defined backbone cannot be created or remains more costly. MANET brings ease and flexibility but at the same time it also introduces various limitations. This paper proposes Fuzzy logic based efficient packet dropping detection approach (FL-EPDDA) for MANET to overcome that challenges of malicious nodes in MANET. FL-EPDDA use fuzzy inference system (FIS) to identify malicious nodes in MANET. FIS uses three input parameter packet delivery ratio, packet forward and residual energy of node. FIS classifies the network nodes weather it is malicious or not with the help of these inputs. FL-EPDDA identifies the above discussed activities and it also discovers a trusted and secure path for secure data transmission. FL-EPDDA very efficiently classifies normal working mobile nodes and malicious nodes within MANET. Experimental are performed under parameters like packet delivery ratio, average throughput and packet drop rate with variation in malicious nodes in MANET. Comparative experimental results shows the proposed FL-EPDDA outperforms current state of art AODV under all the test conditions.

Keywords

Fuzzy logic FIS Malicious node MANET 

References

  1. 1.
    Wu, L., Yu, R.: A Threshold-based method for selfish nodes detection in MANET. In: Computer Symposium (ICS), pp. 875–882 (2010)Google Scholar
  2. 2.
    Buttyn, L., Hubaux, J. P.: Enforcing service availability in mobile Ad-Hoc WANs. In: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 87–96 (2000)Google Scholar
  3. 3.
    Lal, C., Petroccia, R., Pelekanakis, K., Conti, M., Alves, J.: Toward the development of secure underwater acoustic networks. IEEE J. Ocean. Eng. 42(4), 1075–1087 (2017)CrossRefGoogle Scholar
  4. 4.
    Khan, S., Prasad, R., Saurabh, P., Verma, B.: Weight-Based Secure Approach for Identifying Selfishness Behavior of Node in MANET. In: Satapathy S., Tavares J., Bhateja V., Mohanty J. (eds.) Information and Decision Sciences. Advances in Intelligent Systems and Computing, vol. 701, pp 387–397 (2018)Google Scholar
  5. 5.
    Bisen, D., Sharma, S.: Fuzzy based detection of malicious activity for security assessment of MANET, Natl. Acad. Sci. Lett., 23–28 (2017)CrossRefGoogle Scholar
  6. 6.
    Bisen, D., Sharma, S.: An energy-efficient routing approach for performance enhancement of MANET through adaptive neuro-fuzzy inference system. Int. J. Fuzzy Syst. 2693–2708 (2018)CrossRefGoogle Scholar
  7. 7.
    Bisen, D., Sharma, S.: An enhanced performance through agent-based secure approach for mobile ad hoc networks. Int. J. Electron. 116–136 (2017)CrossRefGoogle Scholar
  8. 8.
    Ravi, G., Kashwan, K.R.: A new routing protocol for energy efficient mobile applications for ad-hoc networks. Comput. Electr. Eng. 48, 77–85 (2015)CrossRefGoogle Scholar
  9. 9.
    The Network Simulator ns-2, Information Sciences Institute, USA. Viterbi School of Engineering, September. Retrieved from http://www.isi.eu/nsnam/ns/ (2017)
  10. 10.
    Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert. Syst. Appl., Elsevier 60, 311–320 (2016)CrossRefGoogle Scholar
  11. 11.
    Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab. J. Inf. Technol. 15(2), 289–295 (2018)Google Scholar
  12. 12.
    Saurabh, P., Verma, B, Sharma, S.: An immunity inspired anomaly detection system: a general framework a general framework. In: 7th International conference on bio-inspired computing: theories and applications (BIC-TA 2012), AISC (vol. 202, pp. 417–428). Springer (2012)Google Scholar
  13. 13.
    Saurabh, P., Verma, B, Sharma, S.: Biologically Inspired Computer Security System: The Way Ahead, Recent Trends in Computer Networks and Distributed Systems Security, CCIS (vol. 335, pp. 474-484). Springer (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Technocrats Institute of Technology (Advance)BhopalIndia
  2. 2.Technocrats Institute of TechnologyBhopalIndia

Personalised recommendations