Detection of Black Hole Attack In MANET Using FBC Technique

2013 
In the era of wireless networking system, mobile- ad-hoc network (MANET) are widely in acceptance. MANET consists of the mobile nodes that are free to move in and out in the network. In a MANET, nodes are the system or devices i.e. Mobile phones, laptops, PDAs, MP3 player and a personal computer that is participating in the network and are mobile. They can form arbitrary topologies depending upon their connectivity with each other in the network. The nodes have the ability of self-configuring themselves on the basis of the demand, due to which they can be deployed urgently without the need of any infrastructure. MANET often suffers from security attacks because of its features like open medium, changing its topology dynamically, lack of central monitoring and management, cooperative algorithm and no clear defense mechanism. This paper contains a brief study of black hole attack, under the AODV routing protocol and its effect are elaborated by stating how this attack disrupt the performance of MANET. And also study of the impact of black hole attacks in MANET using both reactive and proactive protocols and to compare the vulnerability of both these protocols against attack. We also present a technique which uses the fuzzy based control, to detect and mitigate type of attack, namely malicious packet dropping, in wireless ad-hoc network. A malicious node in a network promises to forward packets but drop or delay them. In our technique, every node in the mobile ad-hoc network sends the route request and waits for the acknowledgment. The requesting node analyzes the behavior of unknown node using fuzzy technique and on the basis of result the node takes this node in the route of the packet. Subsequently, states of the nodes can also be utilized by the routing protocol to bypass those malicious nodes. Our method shows that in a dynamically changing network, this technique can detect most of the malicious nodes with a relatively high positive rate. The packet delivery rate in the MANET can also be increased accordingly.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    7
    References
    4
    Citations
    NaN
    KQI
    []