International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 2 Issue 8, August 2013

Black Hole Attack Detection using Fuzzy Logic

Sonal, Kiran Narang

MANET is a dynamic network with large number of mobile nodes.As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss.This congestion and packet loss problems occurs due to the attack in manet.one of attack is black hole attack.As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule.fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.

Keywords: MANET, Fuzzy logic, Black hole attack, Packet loss, Data rate

Edition: Volume 2 Issue 8, August 2013

Pages: 222 - 225

Share this Article

How to Cite this Article?

Sonal, Kiran Narang, "Black Hole Attack Detection using Fuzzy Logic", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=30071301, Volume 2 Issue 8, August 2013, 222 - 225

45 PDF Views | 38 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'MANET'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1191 - 1196

Lightweight Key Distribution for Secure Routing and Secure Information Propagation

Anubha Goyal, Geetanjali Babbar

Share this Article

Similar Articles with Keyword 'Fuzzy logic'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1772 - 1776

A Survey on Facilitating Document Annotation Techniques

Priyanka C. Ghegade, Vinod S. Wadne

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1838 - 1842

Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic

Pawan Kumar, Manoj Challa

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 3001 - 3006

A Fuzzy Based Approach of Energy Efficient Hierarchical Clustering Method in Wireless Sensor Networks

G S M Vamsi, Neha Choubey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 851 - 854

Facial Expression Recognition Using Fuzzy Logic

Sanjay Singh Pal, Muzammil Hasan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Black hole attack'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1002 - 1007

Cryptography Techniques based on Security of AODV in MANETs - A Survey

Ankita Singh, Mahima Sharma

Share this Article

Similar Articles with Keyword 'Packet loss'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1187 - 1192

Effect of Load and Threshold Variation on Performance of RED: Random Early Detection

Kiran Chhabra, Manali Kshirsagar, Arun Zadgaonkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 725 - 727

Congestion Control in Deep Space Communication

Priyaam Das, Jonnagaddala Jagruthi, K. Malathi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1590 - 1592

A Review Paper on Performance of Routing Protocols in NS-2

Rozy Rana, Kanwal Preet Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1606 - 1609

Modified Transfer Mechanism over Multipath TCP

Sreejith N, Maya Mohan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1015 - 1020

A Survey of Reliability Schemes in WSNs

Atul Chavan, Sambhaji Sarode, R. K. Bedi

Share this Article

Similar Articles with Keyword 'Data rate'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2533 - 2535

Overview on Effective Controlling Via Store-Carry and Forward Scheme in Mobile Communication

Anusha Varghese, Dr. K Deeba

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 370 - 375

A Survey on Quality of Service in LTE Networks

Navita, Amandeep

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 222 - 225

Black Hole Attack Detection using Fuzzy Logic

Sonal, Kiran Narang

Share this Article



Top