Open Access Open Access  Restricted Access Subscription or Fee Access

ERAF – Extensive Reputed ARAN using Fuzzy Logic

R. Sudha, Dr. D. Sivakumar

Abstract


Mobile ad hoc networks, an instantaneous, easily deployable, infrastructure less network paves way for many applications in this ever widening communication world. The important aspect lies in securing Mobile Ad hoc Network (MANET) due to its decentralized architecture, dynamic topology and the mobility of the nodes. Many secure routing protocols has been evolving continuously in all these years but, still a perfect security protocol has not been achieved. Authenticated Routing for Ad hoc Networks (ARAN), an efficient secure routing protocol satisfies major security parameters such as message integrity, authentication, confidentiality and non- repudiation, but failed to differentiate the legitimate nodes from malicious nodes and selfish nodes. Reputed ARAN (RARAN) was latter proposed to perceive the selfish nodes and the protocol was efficient. This work ERAF focuses on detecting the selfish node with greater accuracy. In RARAN, the probability of detection of selfish nodes was less accurate. The protocol, which I have proposed - ERAF – Extensive Reputed ARAN using fuzzy logic, aims in achieving greater accuracy for detecting selfish nodes by integrating the fuzzy logic with the existing secure RARAN. The work aims at measuring the battery power gradually from minimum threshold to maximum threshold, a critical region of packet drop by selfish nodes. It also increases the efficiency of MANET. The overhead experienced in RARAN also is reduced by this protocol. Moreover decreasing signal strength contributes to dropping of packets which cannot be differentiated from selfish nodes. Using fuzzy logic the signal strength can be accurately predicted and when it falls below the threshold level, alternate route is chosen. Based on the two major parameters considered in this work, battery power and signal strength selfish nodes are detected accurately using the fuzzy logic at the earliest and isolated from the network.


Keywords


ARAN, ERAF, Fuzzy Logic, Selfish Nodes.

Full Text:

PDF

References


Matthias Hollick, Jens Schmitt, Christian seipl, (2004) „„On the Effect of Node Misbehaviour in Ad hoc Network” Proc. IEEE Conference on Communication, Vol 6, pp 3759– 3763.

Nikos Komninos, Dimitris Vergados, Christos Douligeris, (2007) “Detecting unauthorized and compromised nodes in mobile ad hoc networks” Ad hoc Networks-Elsevier, Vol 5, Issue 3, pp-289-298.

S.Marti, T. Giuli, K.Lai, M.Baker, (2000) “Mitigating routing Misbehaviour in Mobile Ad–hoc Networks”, In Proc of the Sixth International conference on Mobile Computing and networking (MOBICOM), Boston.

Pietro Michiardi and Refik Molva,(2002) “CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks” Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia.

S. Buchegger and J-Y. Le Boudec, (2002) “Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes, Fairness In Dynamic Ad-hoc Networks”, Proc. of the IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC).

Sonja Buchegger, Jean Yves Le Boundee, (2004) “Self – policing in Mobile Ad hoc Networks” In CRC Press, Chapter Handbook on Mobile Computing,.

Tamer Refaei, Vivek Srivastava, LuizDaSilva, (2005) “A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks”, Proc. IEEE Second Annual InternationalConference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous‟05), pp 3-11.

Fei Wang, Yijun Mo, Benxiong Huang, (2006) “COSR: Cooperative on Demand Secure Route Protocol in MANET”, IEEE ISCIT, China, pp 890-893.

[9] J. Mendel. Fuzzy logic systems for engineering: a tutorial. Proceedings of the IEEE, 83(3):345{377, Mar 1995.

Kiszka, J. B., Kochanska, M. E. and Sliwinska, D. S. (1985). The influence of some fuzzy implication operators on the accuracy of a fuzzy model, )X]] 6HWV DQG 6VWHPV __: (Part1) 111–128; (Part 2) 223 – 240.

Zadeh, L. A. (1975). The concept of a linguistic variable and its application to approximate reasoning,, QIRUPDWLRQ 6FLHQFHV _: 43–80.

Preeti Nagrath et al. / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 09, 2010, 3095-3099 “Authenticated Routing Protocol Based on Reputation System For Adhoc Networks”.

Bansal and M. Baker. Observation-based Cooperation Enforcement in Ad Hoc Networks. http://arxiv.org/pdf/cs.NI/0307012, July 2003.

B. Schneier. Attack Trees: Modeling security threats. Dr Dobb‟s Journal, December 199923. P. Yau and C. Mitchell. Reputation methods for routing security for mobile ad hoc networks. Proceedings of SympoTIC, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, October 2003, pages 130-137.

C. E. Perkins, Elizabeth Belding-Royer, Samir Das, Ad hoc On-Demand Distance Vector Routing, IETF Draft, January 2002.

Adrian Perrig, Ran Canetti, J D Tygar, Dawn Song, The TESLA Broadcast Authentication Protocol, UC Berkeley and IBM Research.

Yih-Chun Hu, Adrian Perrig, David Johnson, Packet Leashes: A defense against wormhole attacks in wireless ad hoc networks, Rice University, Technical Report, September 2002.

P. Papadimitratos and Z. Haas, Secure routing for mobile ad hoc networks," in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.