The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Fuzzy Heuristics for Detecting and Preventing Black Hole Attack

Mobile Ad-hoc Networks (MANET) is a set of computing nodes with there is no fixed infrastructure support. Every node in the network communicates with one another through wireless links. However, in MANET, the dynamic topology of the nodes is the vital demanding duty to produce security to the network and the black hole attacks get identified and prevented. In this paper, a novel fuzzy inference system is designed for black hole attack detection depending on the node authentication, trust value, Certificate Authority (CA), energy level, and message integrity. Before initiating the route discovery process in MANET, the proposed work mainly concentrates on node authentication. The simulation gets carried out using the Network Simulator (NS2), wherein the fuzzy inference system designed shows better performance by providing a certificate to only the trusted nodes. This helps the malicious nodes detection and prevents the black hole attack. The improvement in Packet Delivery Ratio (PDR) enhances throughput and the end to end delay gets reduced through better performance results. This proves that the system is more reliable and recovered to be used in military applications.

[1] Abdullah A., Ozen E., and Bayramoglu H., “Enhanced-AODV Routing Protocol to Improve Route Stability of MANETs,” The International Arab Journal of Information Technology, vol. 19, no. 5, pp. 736-746, 2022. https://doi.org/10.34028/iajit/19/5/5

[2] Banerjee P., Paulchoudhury J., and Chaudhuri S., “Fuzzy Membership Function in a Trust Based AODV for MANET,” International Journal of Computer Network and Information Security, vol. 5, no. 12, pp. 27-34, 2013. DOI:10.5815/ijcnis.2013.12.04

[3] Boukrim M. and Antari J., “Improvement of Packet Transmission Scheduling and Delivery Rate in Wireless Ad-hoc Networks,” Physical Communication, vol. 52, pp. 101707, 2022. https://doi.org/10.1016/j.phycom.2022.101707

[4] Chen Z., Tian L., and Lin C., “Trust Evaluation Model of Cloud User Based on Behavior Data,” International Journal of Distributed Sensor Networks, vol. 14, no. 5, pp. 1-10, 2018. https://doi.org/10.1177/1550147718776924

[5] Dromard J., Khatoun R., and Khoukhi L., “A Watchdog Extension Scheme Considering Packet Loss for a Reputation System in Wireless Mesh Network,” in Proceedings of the 20th International Conference on Telecommunications, Casablanca, pp. 1-5, 2013. DOI:10.1109/ICTEL.2013.6632124

[6] Farahani G., “Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks,” Security and Communication Networks, vol. 2021, pp. 1-5, 2021. https://doi.org/10.1155/2021/8814141

[7] Hallani H. and Hellany A., “Wireless Ad-hoc Networks: Using Fuzzy Trust Approach to Improve Security between Nodes,” in Proceedings of the International Conference on Computer Engineering and Systems, Cairo, pp. 359-365, 2009. DOI:10.1109/ICCES.2009.5383241

[8] Jain S. and Khuteta A., “Detecting and Overcoming Blackhole Attack in Mobile Adhoc Network,” in Proceedings of the International Conference on Green Computing and Internet of Things, Greater Noida, pp. 225-229, 2015. DOI:10.1109/ICGCIoT.2015.7380462

[9] Kumar S., Narender M., and Ramesh G., “Security Provision for Mobile Ad-Hoc Networks Using NTP and Fuzzy Logic Techniques,” Global Journal of Computer Science and Technology, vol. 10, no. 8, pp. 62-67, 2010. file:///C:/Users/user/Downloads/SecurityProvisio nForMobileAd- HocNetworksUsingNtpFuzzyLogicTechniques.p df

[10] Macedo D., Dos Santos A., Nogueira J., and Pujolle G., “A Distributed Information Repository for Autonomic Context-Aware MANETs,” IEEE Transactions on Network and Service 92 The International Arab Journal of Information Technology, Vol. 21, No. 1, January 2024 Management, vol. 6, no. 1, pp. 45-55, 2009. DOI:10.1109/TNSM.2009.090304

[11] Madhurya M., Krishna B., and Subhashini T., “Implementation of Enhanced Security Algorithms in Mobile Ad Hoc Networks,” International Journal of Computer Network and Information Security, vol. 6, no. 2, pp. 30-37, 2014. DOI:10.5815/ijcnis.2014.02.05

[12] Mo L., “Research on Trust Calculation Mechanism of Wireless Sensor Network of Internet of Things,” in Proceedings of the 3rd International Conference on Automation, Mechanical Control and Computational Engineering, Dalian, pp. 23-28, 2018. DOI:10.2991/amcce-18.2018.5

[13] Najjar M., “New Technique to Insure Data Integrity for Archival Files Storage (DIFCS),” International Journal of Advanced Computer Science and Applications, vol. 5, no. 2, pp. 44-49, 2014. DOI:10.14569/IJACSA.2014.050207

[14] Pirzada A. and McDonald C., “Establishing Trust in Pure Ad-Hoc Networks,” in Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, pp. 47-54, Dunedin, 2004. https://dl.acm.org/doi/pdf/10.5555/979922.97992 9

[15] Preetha V. and Chitra K., “Fuzzy Based Analysis for Efficient Clustering in MANET and Security Enhancement Approach using Neural Network,” International Journal of Intelligent Computing Research, vol. 7, no. 2, pp. 706-710, 2016.

[16] Sadasivam K. and Yang T., “Evaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks,” in Proceedings of the International Conference on Networks and Communication Systems, Krabi, pp. 183-464, 2005. http://www.actapress.com/Abstract.aspx?paperId =19905

[17] Shams E. and Rizaner A., “A Novel Support Vector Machine Based Intrusion Detection System for Mobile Ad Hoc Networks,” Wireless Networks, vol. 24, no. 5, pp. 1821-1829, 2018. DOI:10.1007/s11276-016-1439-0

[18] Singh O., Singh J., and Singh R., “Multi-Level Trust Based Intelligence Intrusion Detection System to Detect the Malicious Nodes Using Elliptic Curve Cryptography in MANET,” Cluster Computing, vol. 21, no. 1, pp. 51-63, 2018. DOI:10.1007/s10586-017-0927-z

[19] Srinivas T. and Manivannan S., “Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid Meta-Heuristic-Based Shortest Path Routing,” Journal of Ambient Intelligence and Smart Environments, vol. 13, no. 2, pp. 133-156, 2021. https://doi.org/10.3233/AIS-210591

[20] Tanwar S. and Kumar A., “Extended Design and Implementation of Certificate Authorities,” International Journal of Security and its Applications, vol. 11, no. 8, pp. 13-26, 2017. https://article.nadiapub.com/IJSIA/vol11_no8/2.p df

[21] Thachil F. and Shet K., “A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET,” in Proceedings of the International Conference on Computing Sciences, Phagwara, pp. 281-285, 2012. DOI:10.1109/ICCS.2012.7

[22] Vij A. and Sharma V., “Security Issues in Mobile Adhoc Network: A Survey Paper,” in Proceedings of the International Conference on Computing, Communication and Automation, Greater Noida, pp. 561-566, 2016. DOI:10.1109/CCAA.2016.7813784

[23] Wu B., Chen J., Wu J., and Cardei M., Signals and Communication Technology, Springer, 2007. https://doi.org/10.1007/978-0-387-33112-6_5

[24] Younas S., Rehman F., Maqsood T., Mustafa S., Akhunzada A., and Gani A., “Collaborative Detection of Black Hole and Gray Hole Attacks for Secure Data Communication in VANETs,” Applied Sciences, vol. 12, no. 23, pp. 12448, 2022. https://doi.org/10.3390/app122312448