Skip to main content

Fuzzy Logic Based Packet Dropping Detection Approach for Mobile Ad-Hoc Wireless Network

  • Conference paper
  • First Online:
Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1057))

Abstract

Mobile ad hoc network (MANET) is a lively network that is self configuring in nature because of its mobility characteristics. MANET plays an important role in situations where fixed wired pre-defined backbone cannot be created or remains more costly. MANET brings ease and flexibility but at the same time it also introduces various limitations. This paper proposes Fuzzy logic based efficient packet dropping detection approach (FL-EPDDA) for MANET to overcome that challenges of malicious nodes in MANET. FL-EPDDA use fuzzy inference system (FIS) to identify malicious nodes in MANET. FIS uses three input parameter packet delivery ratio, packet forward and residual energy of node. FIS classifies the network nodes weather it is malicious or not with the help of these inputs. FL-EPDDA identifies the above discussed activities and it also discovers a trusted and secure path for secure data transmission. FL-EPDDA very efficiently classifies normal working mobile nodes and malicious nodes within MANET. Experimental are performed under parameters like packet delivery ratio, average throughput and packet drop rate with variation in malicious nodes in MANET. Comparative experimental results shows the proposed FL-EPDDA outperforms current state of art AODV under all the test conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wu, L., Yu, R.: A Threshold-based method for selfish nodes detection in MANET. In: Computer Symposium (ICS), pp. 875–882 (2010)

    Google Scholar 

  2. Buttyn, L., Hubaux, J. P.: Enforcing service availability in mobile Ad-Hoc WANs. In: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 87–96 (2000)

    Google Scholar 

  3. Lal, C., Petroccia, R., Pelekanakis, K., Conti, M., Alves, J.: Toward the development of secure underwater acoustic networks. IEEE J. Ocean. Eng. 42(4), 1075–1087 (2017)

    Article  Google Scholar 

  4. Khan, S., Prasad, R., Saurabh, P., Verma, B.: Weight-Based Secure Approach for Identifying Selfishness Behavior of Node in MANET. In: Satapathy S., Tavares J., Bhateja V., Mohanty J. (eds.) Information and Decision Sciences. Advances in Intelligent Systems and Computing, vol. 701, pp 387–397 (2018)

    Google Scholar 

  5. Bisen, D., Sharma, S.: Fuzzy based detection of malicious activity for security assessment of MANET, Natl. Acad. Sci. Lett., 23–28 (2017)

    Article  Google Scholar 

  6. Bisen, D., Sharma, S.: An energy-efficient routing approach for performance enhancement of MANET through adaptive neuro-fuzzy inference system. Int. J. Fuzzy Syst. 2693–2708 (2018)

    Article  Google Scholar 

  7. Bisen, D., Sharma, S.: An enhanced performance through agent-based secure approach for mobile ad hoc networks. Int. J. Electron. 116–136 (2017)

    Article  Google Scholar 

  8. Ravi, G., Kashwan, K.R.: A new routing protocol for energy efficient mobile applications for ad-hoc networks. Comput. Electr. Eng. 48, 77–85 (2015)

    Article  Google Scholar 

  9. The Network Simulator ns-2, Information Sciences Institute, USA. Viterbi School of Engineering, September. Retrieved from http://www.isi.eu/nsnam/ns/ (2017)

  10. Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert. Syst. Appl., Elsevier 60, 311–320 (2016)

    Article  Google Scholar 

  11. Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab. J. Inf. Technol. 15(2), 289–295 (2018)

    Google Scholar 

  12. Saurabh, P., Verma, B, Sharma, S.: An immunity inspired anomaly detection system: a general framework a general framework. In: 7th International conference on bio-inspired computing: theories and applications (BIC-TA 2012), AISC (vol. 202, pp. 417–428). Springer (2012)

    Google Scholar 

  13. Saurabh, P., Verma, B, Sharma, S.: Biologically Inspired Computer Security System: The Way Ahead, Recent Trends in Computer Networks and Distributed Systems Security, CCIS (vol. 335, pp. 474-484). Springer (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Sheevendra Singh or Praneet Saurabh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, S., Sharma, I., Saurabh, P., Prasad, R. (2020). Fuzzy Logic Based Packet Dropping Detection Approach for Mobile Ad-Hoc Wireless Network. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1057. Springer, Singapore. https://doi.org/10.1007/978-981-15-0184-5_23

Download citation

Publish with us

Policies and ethics