Abstract

Intrusion Detection System (IDS) provides additional security for the most vulnerable Mobile Adhoc Networks (MANET). Use of Fuzzy Inference System (FIS) in the design of IDS is proven to be efficient in detecting routing attacks in MANETs. Clustering is a vital means in the detection process of FIS based hybrid IDS. This study describes the design of such a system to detect black hole attack in MANET that uses Adhoc On-Demand Distance Vector (AODV) routing protocol. It analyses the effect of two clustering algorithms and also prescribes the suitable clustering algorithm for the above-mentioned IDS. MANETs with various traffic scenarios were simulated and the data set required for the IDS is extracted. A hybrid IDS is designed using Sugeno type-2 FIS to detect black hole attack. From the experimental results, it is derived that the subtractive clustering algorithm produces 97% efficient detection while FCM offers 91%. It has been found that the subtractive clustering algorithm is more fit and efficient than the Fuzzy C-Means clustering (FCM) for the FIS based detection system.

Highlights

  • Securing a Mobile Adhoc Networks (MANET) is a challenging and intricate due to lack of infrastructure, vulnerable medium, mobile nodes and resource constraints

  • This study describes the design of such a system to detect black hole attack in MANET that uses Adhoc On-Demand Distance Vector (AODV) routing protocol

  • This study aims at analyzing the effect of two fundamental clustering algorithms, namely, subtractive clustering and Fuzzy C-Means clustering (FCM), in the design of a Fuzzy Inference System (FIS) based hybrid Intrusion Detection System (IDS), which combines specification and anomaly based approaches

Read more

Summary

Introduction

Securing a MANET is a challenging and intricate due to lack of infrastructure, vulnerable medium, mobile nodes and resource constraints. Choice of suitable routing protocol is the key factor in determining the proper operation of any MANET. AODV is a reactive routing protocol (Perkins, 2008), which establishes paths on request from the source. It follows a Route Discovery Process (RDP) that involves the transmission of Route Request (RREQ) packet from the source node to all the neighbouring nodes. Any intermediate node or the destination node itself generates a Router Reply (RREP) packet, indicating the path to destination and sends back to the source.

Objectives
Methods
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.