Abstract
Security in mobile ad hoc environment is the most concerned research issue which is focused in the proposed research methodology by introducing authenticated routing based attack injection and detection framework using genetic fuzzy rule based system (AR-AIDF-GFRS). This assures both the successful detections of attacks present in the environment and secured routing by using trusted nodes. Here, initially, jellyfish attack is injected into the MANET environment. This attack is detected by genetic fuzzy based rule system which would generate rules based on which attack would be identified. And then to ensure the secured routing, trust evaluation of nodes is done by ant colony based trust evaluation method (ACTEM). This method selects the optimal nodes which are trusted in nature for establishing the route path. The overall evaluation of the proposed research method is done in NS2 simulation environment which proves that AR-AIDF-GFRS can outperform the existing research method by accurately identifying attacker nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40, 70–75.
Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications, 11, 38–47.
Karpijoki, V. (2000, December). Security in ad hoc networks. In Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland.
Andel, T. R., & Yasinsac, A. (2007). The invisible node attack revisited. Proceedings of IEEE SoutheastCon, 2007, 686–691.
Hu, Y., Perrig, A., & Johnson, D. (2002). Ariadne: A secure on-demand routing for ad hoc networks. In Proceedings of MobiCom 2002, Atlanta.
Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MOBICOM), Boston.
Di Crescenzo, G., Telcordia Technol, N. J., Ge, R., & Arce, G. R. (2006). Securing reliable server pooling in MANET against byzantine adversaries‖. IEEE Journal on Selected Areas in Communications, 24, 357–369.
Kim, D., Bae, H., & Toh, C. K. (2007). Improving TCP-Vegas performance over MANET routing protocols. IEEE Transactions on Vehicular Technology, 56(1), 372–377.
Lee, U., Park, J.-S., Lee, S.-H., Ro, W. W., Pau, G., & Gerla, M. (2008). Efficient peer-to-peer file sharing using network coding in MANET. IEEE Journal on Communications and Networks, 10, 422–429.
El Defrawy, K., & Tsudik, G. (2010). ALARM: Anonymous location-aided routing in suspicious MANETs. IEEE Journal on Mobile Computing, 10, 1345–1358.
Zhao, Z. Hu, H., Ahn, G.-J., & Wu, R. (2011). Risk-aware mitigation for MANET routing attacks. IEEE Journal on Dependable and Secure Computing, 9, 250–260. (Security Eng. for Future Comput. Lab., Arizona State Univ., Tempe, AZ, USA).
Kaur, M., Sarangal, M., & Nayyar, A. (2014). Simulation of jelly fish periodic attack in mobile ad hoc networks. International Journal of Computer Trends and Technology (IJCTT), 15.
Kaur, M., & Nayyar, A. (2013). A comprehensive review of mobile adhoc networks (MANETS). International journal of emerging trends & technology in computer science (IJETTCS), 2(6), 196–210.
Kaur, M., Rani, M., & Nayyar, A. (2014, September). A novel defense mechanism via Genetic Algorithm for counterfeiting and combating jelly fish attack in mobile ad-hoc networks. In 2014 5th International Conference Confluence The Next Generation Information Technology Summit (Confluence) (pp. 359–364). IEEE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Suseendran, G., Chandrasekaran, E., Nayyar, A. (2019). Defending Jellyfish Attack in Mobile Ad hoc Networks via Novel Fuzzy System Rule. In: Balas, V., Sharma, N., Chakrabarti, A. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-1274-8_33
Download citation
DOI: https://doi.org/10.1007/978-981-13-1274-8_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1273-1
Online ISBN: 978-981-13-1274-8
eBook Packages: EngineeringEngineering (R0)