Skip to main content

Defending Jellyfish Attack in Mobile Ad hoc Networks via Novel Fuzzy System Rule

  • Conference paper
  • First Online:
Data Management, Analytics and Innovation

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 839))

Abstract

Security in mobile ad hoc environment is the most concerned research issue which is focused in the proposed research methodology by introducing authenticated routing based attack injection and detection framework using genetic fuzzy rule based system (AR-AIDF-GFRS). This assures both the successful detections of attacks present in the environment and secured routing by using trusted nodes. Here, initially, jellyfish attack is injected into the MANET environment. This attack is detected by genetic fuzzy based rule system which would generate rules based on which attack would be identified. And then to ensure the secured routing, trust evaluation of nodes is done by ant colony based trust evaluation method (ACTEM). This method selects the optimal nodes which are trusted in nature for establishing the route path. The overall evaluation of the proposed research method is done in NS2 simulation environment which proves that AR-AIDF-GFRS can outperform the existing research method by accurately identifying attacker nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40, 70–75.

    Article  Google Scholar 

  2. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications, 11, 38–47.

    Article  Google Scholar 

  3. Karpijoki, V. (2000, December). Security in ad hoc networks. In Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland.

    Google Scholar 

  4. Andel, T. R., & Yasinsac, A. (2007). The invisible node attack revisited. Proceedings of IEEE SoutheastCon, 2007, 686–691.

    Google Scholar 

  5. Hu, Y., Perrig, A., & Johnson, D. (2002). Ariadne: A secure on-demand routing for ad hoc networks. In Proceedings of MobiCom 2002, Atlanta.

    Google Scholar 

  6. Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MOBICOM), Boston.

    Google Scholar 

  7. Di Crescenzo, G., Telcordia Technol, N. J., Ge, R., & Arce, G. R. (2006). Securing reliable server pooling in MANET against byzantine adversaries‖. IEEE Journal on Selected Areas in Communications, 24, 357–369.

    Article  Google Scholar 

  8. Kim, D., Bae, H., & Toh, C. K. (2007). Improving TCP-Vegas performance over MANET routing protocols. IEEE Transactions on Vehicular Technology, 56(1), 372–377.

    Google Scholar 

  9. Lee, U., Park, J.-S., Lee, S.-H., Ro, W. W., Pau, G., & Gerla, M. (2008). Efficient peer-to-peer file sharing using network coding in MANET. IEEE Journal on Communications and Networks, 10, 422–429.

    Google Scholar 

  10. El Defrawy, K., & Tsudik, G. (2010). ALARM: Anonymous location-aided routing in suspicious MANETs. IEEE Journal on Mobile Computing, 10, 1345–1358.

    Google Scholar 

  11. Zhao, Z. Hu, H., Ahn, G.-J., & Wu, R. (2011). Risk-aware mitigation for MANET routing attacks. IEEE Journal on Dependable and Secure Computing, 9, 250–260. (Security Eng. for Future Comput. Lab., Arizona State Univ., Tempe, AZ, USA).

    Google Scholar 

  12. Kaur, M., Sarangal, M., & Nayyar, A. (2014). Simulation of jelly fish periodic attack in mobile ad hoc networks. International Journal of Computer Trends and Technology (IJCTT), 15.

    Google Scholar 

  13. Kaur, M., & Nayyar, A. (2013). A comprehensive review of mobile adhoc networks (MANETS). International journal of emerging trends & technology in computer science (IJETTCS), 2(6), 196–210.

    Google Scholar 

  14. Kaur, M., Rani, M., & Nayyar, A. (2014, September). A novel defense mechanism via Genetic Algorithm for counterfeiting and combating jelly fish attack in mobile ad-hoc networks. In 2014 5th International Conference Confluence The Next Generation Information Technology Summit (Confluence) (pp. 359–364). IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Suseendran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Suseendran, G., Chandrasekaran, E., Nayyar, A. (2019). Defending Jellyfish Attack in Mobile Ad hoc Networks via Novel Fuzzy System Rule. In: Balas, V., Sharma, N., Chakrabarti, A. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-1274-8_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1274-8_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1273-1

  • Online ISBN: 978-981-13-1274-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics