Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network

The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.

[1]  Purvi Tandel,et al.  Mitigating techniques of black hole attack in MANET: A review , 2017, 2017 International Conference on Trends in Electronics and Informatics (ICEI).

[2]  Shashi Gurung,et al.  A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET , 2019, Wirel. Networks.

[3]  Shashi Gurung,et al.  A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability , 2020, Wirel. Networks.

[4]  Adwan Yasin,et al.  Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique , 2018, Wirel. Commun. Mob. Comput..

[5]  Shashi Gurung,et al.  Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET , 2019, Wirel. Networks.

[6]  Kapil Juneja Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANET , 2020, Wirel. Pers. Commun..

[7]  Ventrapragada Sree Pooja,et al.  Mobile Ad-hoc Networks Security Aspects in Black Hole Attack , 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA).

[8]  Abdelkamel Tari,et al.  Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET , 2018, J. Inf. Secur. Appl..

[9]  Liang Zhou,et al.  Routing Authentication Chain Mechanism to Resist AODV Black Hole Attacks , 2020, ICCSP.

[10]  D. John Aravindhar,et al.  Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism , 2019, 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA).

[11]  Kapil Juneja DRI Table Based Traffic-Behaviour Analysis Approach for Detection of Blackhole Attack , 2020 .

[12]  Divya Sai Keerthi Tiruvakadu,et al.  Honeypot Based Black-Hole Attack Confirmation in a MANET , 2018 .

[13]  A. Umamakeswari,et al.  Black hole detection using evolutionary algorithm for IDS/IPS in MANETs , 2019, Cluster Computing.

[14]  Houda Moudni,et al.  Black Hole attack Detection using Fuzzy based Intrusion Detection Systems in MANET , 2019, ANT/EDI40.

[15]  S. Sivanesh,et al.  Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks , 2020, Mob. Networks Appl..

[16]  Seong-Moo Yoo,et al.  Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks , 2020, J. Inf. Secur. Appl..

[17]  Ephantus Gichuki MWANGI,et al.  A Review of Security Techniques against Black hole Attacks in Mobile Ad hoc Networks , 2019, 2019 IST-Africa Week Conference (IST-Africa).

[18]  Shashi Gurung,et al.  A dynamic threshold based approach for mitigating black-hole attack in MANET , 2018, Wirel. Networks.

[19]  Nandagopal Malarvizhi,et al.  Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt AODV in MANET , 2019, Wirel. Pers. Commun..

[20]  R. Ravi,et al.  Novel Trust Based Energy Aware Routing Mechanism for Mitigation of Black Hole Attacks in MANET , 2019, Wirel. Pers. Commun..

[21]  Firas Albalas,et al.  Detecting black hole attacks in MANET using relieff classification algorithm , 2019 .

[22]  Mohammad Ali Jabraeil Jamali,et al.  EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs , 2019, J. Ambient Intell. Humaniz. Comput..

[23]  Muneer Bani Yassein,et al.  Intelligent black hole detection in mobile AdHoc networks , 2019, International Journal of Electrical and Computer Engineering (IJECE).

[24]  Prakhar Golchha,et al.  A Survey on Black Hole Attack in MANET Using AODV , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[25]  S. D. Shirbahadurkar,et al.  A survey on black hole attack in mobile ad hoc networks , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).

[26]  Syed Jalal Ahmad,et al.  ESMBCRT: Enhance Security to MANETs Against Black Hole Attack Using MCR Technique , 2019 .

[27]  Ali Dorri,et al.  DEBH: detecting and eliminating black holes in mobile ad hoc network , 2018, Wirel. Networks.

[28]  My Driss Laanaoui,et al.  Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3 , 2018, 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM).

[29]  Han-Chieh Chao,et al.  Black Hole along with Other Attacks in MANETs: A Survey , 2018, J. Inf. Process. Syst..

[30]  Abdulghani Ali Ahmed,et al.  Detection of Black Hole Attacks in Mobile Ad Hoc Networks via HSA-CBDS Method , 2018, Intelligent Computing & Optimization.

[31]  R. K. Gnanamurthy,et al.  Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network , 2019, Mob. Networks Appl..

[32]  Pravin R Satav,et al.  Secure Route Selection Mechanism in the Presence of Black Hole Attack with AOMDV Routing Algorithm , 2018, 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA).

[33]  R. Priyadarshini,et al.  Cross centric intrusion detection system for secure routing over black hole attacks in MANETs , 2019, Comput. Commun..

[34]  P. Tamilselvi,et al.  An efficient approach to circumvent black hole nodes in manets , 2017, Cluster Computing.