Prevention of Gray Hole Attack Using ABC and Fuzzy Logic

Author(s):  
Lokeshwar Singh ◽  
Ashish Sharma

There are many advantages and reasons for wireless sensor network to be popular. The key concern while establishing wireless sensor network (Mobile ad-hoc network) is the routing protocol to be applied. Routing process is the process of discovering the path that a data packet will follow to get it from the source node to the destination node. As the mobile ad-hoc network consists of mobile nodes with no controlling unit in which each and every step of communication is handled by the nodes within the network itself. The selection of routing protocol is one of the difficult tasks and the key challenge faced by the routing is the energy consumption issue apart from the others. In this research, the routing technique is developed with a basic focus on reduction of the energy consumption while improving the overall performance of the network.  Presently, various efficient routing protocols have been estimated for wireless sensor network. In the presence of malicious nodes, the network becomes penetrable to different kind of attacks. In wireless sensor network, routing-attacks are relatively serious. It has number of potential-applications in completely un-predictable in dynamic environment. Routing protocol utilized here are in a form of reactive-routing protocol known as OLSR. This routing protocol route is based on demand.The proposed work has designed and implemented wireless sensor network in OLSR routing protocol. The gray hole attack is mitigated using Fuzzy Logic based on rule sets to have better routing process and ABC (Artificial Bee Colony) algorithm at superior rate for optimizing the route set at novel objective function.  In this work, the performance analysis of the network with the scenarios consisting 50 nodes moving with the speed of the 5-10m/s within the  area (1000X1000) m2 has been done in regards to the parameters, namely, Throughput, End-to-End Delay, BER (bit error rate) and Energy consumption).  

Wireless Sensor Network (WSN) is a huge collection of sensor nodes deployed without any predetermined infrastructure. They are powered by batteries and energy consumption is one of the major issues in WSN. Hence to prolong the lifetime of the networks, it is important to design the energy efficient optimized routing algorithm. In this paper, two hop forwarding scheme in AODV and Fuzzy Logic is proposed to find an optimal routing protocol and intermediate node acknowledgement is deducted by the use of Fuzzy rules. The parameters such as remaining energy, data packet transmission, packet received acknowledgement and number of rounds is given as input to the fuzzy system which gives an optimized routing decision. The efficacy of the proposed algorithm is evaluated using NS2 and compared with Fuzzy-based Energy-Aware Routing Mechanism (FEARM). The simulation results shows that the Fuzzy based AODV routing algorithm reduces the energy consumption, minimizes the routing response packets and improves the network life time compared to other similar routing protocols.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yaohua Chen ◽  
Waixi Liu

Mobile ad hoc network is a network composed of mobile terminals without infrastructure. Due to its fast-networking ability, it is widely used in smart cities, car networking, military, agriculture, medicine, and other fields. Routing technology is a key technology in the field of MANET (mobile ad hoc network). The energy consumption is optimized through the technical network simulator NS-3, and the nodes in the MANET routing protocol can accurately simulate the problem, thereby optimizing the MAC layer of important research tools. This article combines the advantages of the lithium-ion (lithium) battery model. Compared with the KiBaM battery model, the effective charge in the KiBaM model simulates the output voltage well, which can reflect the battery capacity effect rate and the recovery effect of the lithium-ion-KiBaM battery model. The model can respond to the characteristics of the output voltage as the society gets lower and lower. In order to solve the problem that the analytic solution of differential equations cannot be obtained in the model, a numerical solution of the optimization algorithm is proposed based on the implicit Runge–Kutta method. The MAC layer energy consumption and routing protocol optimization algorithm proposed in this paper can be applied well in various fields.


2011 ◽  
Vol 03 (03) ◽  
pp. 329-338 ◽  
Author(s):  
Saber Ghasempour ◽  
seyed Hossein Kamali ◽  
Maysam Hedayati ◽  
Reza Shakerian

Author(s):  
Puneet Kaur ◽  
Navpreet Kaur

Due to advanced features of wireless sensor devices, the usage of these devices are rises tremendously all over the world. Many researchers work on wireless devices for new enhancement in ad hoc network. WSN (Wireless Sensor Network) included small, low-cost and resource constrained nodes. In order to provide the unique communication protocols many researches have been done in the existing algorithms by introducing new methods and algorithms. In this study, some approaches to eliminate the Sinkhole Attack are introduced that happened in WSN. Apart from this, various routing protocols that can be used to improve the performance of network during transmission of data are discussed in this paper. The performance prediction of routing protocol is very tough task due to varying network scenarios. The performance of WSN is measured using various parameters like throughput, end to end delay are also discussed in this paper.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Sign in / Sign up

Export Citation Format

Share Document