0

An Enhanced Cross-Layer Approach Based on Fuzzy-Logic for Securing Wireless Ad-Hoc Networks from Black Hole Attacks

Apr 30, 2018

DOI: https://doi.org/10.15866/irecap.v8i2.13856

Published in: International Journal on Communications Antenna and Propagation (IRECAP)

Publisher: Praise Worthy Prize

Mohammad M. Shurman Omar M. Al-Jarrah Salem B. Esoh / Sharhabeel Hassan Alnabelsi

Black holes attack in ad-hoc network systems can obstruct network functions, e.g.; successful packets delivery to destinations. Current conventional detection mechanisms are based on single layer information, lack of appropriate performance metrics, and/or the adequate accuracy. In this paper, a new cross layer Intrusion Detection System (IDS) is proposed, in order to mitigate the black hole attack in wireless ad-hoc networks. The proposed work modifies ad-hoc routing protocol for black hole attacks detection through extracting information from different OSI layers, and use these information as inputs into the fuzzy logic system, in which the algorithm precisely detects existing malicious nodes. Using NS2 simulation tool, a comprehensive simulation is conducted in order to compare our proposed approach performance with a recent cross layer-based approach for black hole intrusion detection [20]. Simulation results reveal that our proposed system has a tremendous accuracy in detecting black holes with an acceptable additional overhead.

Other Researches

Finding an Immuned Path against Single Primary User Activity in Cognitive Radio Networks

Due to recent crowdedness in unlicensed spectrum, a new technology is introduced which allows unlicensed users, known as Secondary Users (SUs), to dynamically access licensed spectrum whenever they are not used by their licensed users, known as Prim...

An efficient speech recognition system for arm-disabled students based on isolated words

Over the previous decades, a need has emerged to empower human-machine communication systems, which are essential to not only perform actions, but also obtain information especially in education applications. Moreover, any communication system has t...

A Novel Network Coding Approach: Packets Conflict Based for Matrix Optimization

Network coding (NC) is a technique used to improve wireless networks throughput, efficiency, and scalability. When employing this technique, wireless nodes collect several packets and combine them together in one single transmission. This technique ...

ON ARABIC OBJECT CHARACTER RECOGNITION USING DYNAMIC TIME WARPING

Due to the large volume of Arabic texts in many generated and historical documents, it is essential to use computers in order to make generated texts editable, this is actually the main task of Arabic Object Character Recognition (OCR) systems. The ...

C-DTB-CHR: Centralized Density – and threshold-based Cluster Head Replacement Protocols for Wireless Sensor Networks

Advances introduced to electronics and electromagnetics leverage the production of low-cost and small wireless sensors. Wireless sensor networks (WSNs) consist of large amount of sensors equipped with radio frequency capabilities. In WSNs, data rout...

Improving Routing Performance Using Cooperative Spectrum Sensing in Cognitive Radio Networks

The traditional fixed spectrum assignment policy, in wireless networks, has led to significant underutilization (both spatially and temporally) of some licensed spectrum bands and crowdedness of unlicensed spectrum bands. These challenges gave birth...

On GPS Fault-Tolerance for City-Bus Tracking System using Wireless Sensor Networks

In modern crowded cities, public transportation is one of primary ways for people to go to work, shopping, etc. Therefore, it is necessary to provide an application which estimates buses’ real-time current location, supported by Google map applicati...

Cervical Cancer Diagnostic System Using Adaptive Fuzzy Moving K-Means Algorithm and Fuzzy Min-Max Neural Network

Pap smear screening is the most successful attempt of medical science and practice for the early detection of cervical cancer. Manual analysis of the cervical cells is time consuming, laborious and error prone. This paper presents a Neural Network (...

Resilient Multicast Routing in CRNs Using a Multilayer Hyper-graph Approach

Cognitive Radio Networks (CRNs) have a dynamic nature where channels availability changes over time. In this paper, we introduce a strategy to route multicast sessions in CRNs and to protect them against failures or disappearance of channels. We mod...

Performance Modeling of Secondary Users in CRNs with Heterogeneous Channels

The goal of this paper is to model heterogeneous channel Access in Cognitive Radio Networks (CRNs). In CRNs, when licensed users, known as Primary Users (PUs), are idle, unlicensed users, known as Secondary Users (SUs) can use their assigned channel...

Interference-Based Packet Recovery for Energy Saving in Cognitive Radio Networks

In this paper, we propose to recover collided packets between Primary Users (PUs) and Secondary Users (SUs) in Cognitive Radio Networks (CRNs) for two scenarios. When a collision occurs between an SU and a PU transmitters, the SU's receiver consider...

Uplink Channel Assignment in Cognitive Radio WMNs Using Physical Layer Network Coding

In this paper, we introduce a low overhead scheme for the uplink channel allocation within a single cell of Cognitive Radio Wireless Mesh Network (CR-WMNs). The scheme does not rely on using a Common Control Channel (CCC). The mechanism is based on ...

Optimized Sink Mobility for Energy and Delay Efficient Data Collection in FWSNs

Network fragmentation is a potential problem in wireless sensor networks (WSNs) due to many reasons like, node failures or environmental conditions (obstacles) that prevent connected deployments. One approach to cope with this problem is to have a m...