Open Access   Article Go Back

Detection of Sink Hole Attack Using Decision Tree in Manet

Rohit.Wandra 1 , Parveen Kumar2 , Anita Suman3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 297-302, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.297302

Online published on Mar 31, 2019

Copyright © Rohit.Wandra, Parveen Kumar, Anita Suman . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rohit.Wandra, Parveen Kumar, Anita Suman, “Detection of Sink Hole Attack Using Decision Tree in Manet,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.297-302, 2019.

MLA Style Citation: Rohit.Wandra, Parveen Kumar, Anita Suman "Detection of Sink Hole Attack Using Decision Tree in Manet." International Journal of Computer Sciences and Engineering 7.3 (2019): 297-302.

APA Style Citation: Rohit.Wandra, Parveen Kumar, Anita Suman, (2019). Detection of Sink Hole Attack Using Decision Tree in Manet. International Journal of Computer Sciences and Engineering, 7(3), 297-302.

BibTex Style Citation:
@article{Kumar_2019,
author = {Rohit.Wandra, Parveen Kumar, Anita Suman},
title = {Detection of Sink Hole Attack Using Decision Tree in Manet},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {297-302},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3834},
doi = {https://doi.org/10.26438/ijcse/v7i3.297302}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.297302}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3834
TI - Detection of Sink Hole Attack Using Decision Tree in Manet
T2 - International Journal of Computer Sciences and Engineering
AU - Rohit.Wandra, Parveen Kumar, Anita Suman
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 297-302
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
378 324 downloads 162 downloads
  
  
           

Abstract

Mobile Ad-hoc network (MANET) is an ad-hoc wireless network with a routing network background typically located at the top of a link layer of the network. For the transmission of data routing protocols plays an essential role. Since the topology in MANET is not stable (nodes are moving) therefore routing as well as maintenance of the network is a challenging task. The difficulty that most of the researchers have analyzed is the energy consumed by the sensor nodes. The first problem of this research is to find a trust-based route so that the network can be protected against any additional cost used during the searching of an appropriate node. For this purpose, the Zone Routing Protocol (ZRP) routing mechanism with the concept of Artificial Bee Colony (ABC) algorithm has been used. Another problem that has been considered in this research is to protect the network from external attacks named as sinkhole attack. These attacks are also known as smart attack, as, when these attacks came into the network the sensor nodes do not know that whether the data is transmitted to the genuine node or to the malicious node. Therefore to resolve this problem, machine learning approach named as decision tree is used. The performance parameters are evaluated to measure the efficiency of the network. It has been determine that the Packet Delivery Ratio (PDR) of the proposed system has been increased by 1.19% compared to the existing work.

Key-Words / Index Term

MANET, OLSR, ABC, Decision tree, sinkhole attack

References

[1] K. Agarwal, LK. Awasthi, “Enhanced AODV routing protocol for ad hoc networks,” InNetworks, ICON, 16th IEEE International Conference, pp. 1-5, 2008.
[2] A. Hinds, M. Ngulube, S. Zhu, H. Al-Aqrabi, “A review of routing protocols for mobile ad-hoc networks (manet),” International journal of information and education technology. Vol. 3, No.1, 2013.
[3] A. Al-Maashri, M. Ould-Khaoua, “ Performance analysis of MANET routing protocols in the presence of self-similar traffic,” InLocal Computer Networks, Proceedings 2006 31st IEEE Conference, pp. 801-807, 2006.
[4] A. Bagwari, & R. Jee, “The Criteria Require for Cluster Head Gateway Selection in Integrated Mobile Ad hoc Network,” International Journal of Engineering Science and Technology (IJEST), 2011.
[5] A. Khandakar, “ Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol,” In International Proceedings of Computer Science & Information Tech , Vol. 40, No. 12, 2012.
[6] P. K. Sahu, B. Acharya, & N. Panda, “QoS Based Performance Analysis of AODV and DSR Routing Protocols in MANET,” In 2018 2nd International Conference on Data Science and Business Analytics (ICDSBA), pp. 221-225, 2018.
[7] Y. Jahir, M. Atiquzzaman, H. Refai, A. Paranjothi, & P. G. LoPresti, “Routing protocols and architecture for Disaster Area Network: A survey,” Ad Hoc Networks, Vol. 82, pp.1-14, 2019.
[8] Z. J. Haas, & M. R. Pearlman, “The performance of query control schemes for the zone routing protocol,” IEEE/ACM Transactions on networking, Vol.9, no. 4, pp.427-438, 2001.
[9] N. J. K. Patel, & K. Tripathi, “Trust Value based Algorithm to Identify and Defense Gray-Hole and Black-Hole attack present in MANET using Clustering Method, International Journal of Scientific Research in Science, Engineering and Technology, Vol.4, Issue 4, pp. 281-287, 2018.
[10] X. M. Zhang, Y. Zhang, F. Yan, & A. V. Vasilakos, “Interference-based topology control algorithm for delay-constrained mobile ad hoc networks,” IEEE Transactions on Mobile Computing, Vol. 14, No.4, pp.742-754, 2015.
[11] S. Chatterjee, & S. Das, “Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-hoc network,”. Information Sciences,Vol.295,pp. 67-90, 2015.
[12] A. K. Jain, & V. Tokekar, “Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks,” In Pervasive computing (ICPC), 2015 international conference, pp. 1-6, 2015.
[13] A. S. Chouhan, V. Sharma, U. Singh, & R. Sharma, “A modified AODV protocol to detect and prevent the wormhole usingh using hybrid technique,” In Electronics, Communication and Aerospace Technology (ICECA), 2017 International conference , Vol. 2, pp. 621-625, 2017.
[14] S. Brar, & M. Angurala, “Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with Multiple Swarms,” International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, issue10, pp.424-429, 2017.
[15] J. Gupta, “Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET,” In Signal Processing, Computing and Control (ISPCC), 2017 4th International Conference, pp. 356-361, 2017.
[16] I. J. Jebadurai, E. B. Rajsingh, & G. J. L. Paulraj, “A Novel Node Collusion Method for Isolating Sinkhole Nodes in Mobile Ad Hoc Cloud,” In Advances in Big Data and Cloud Computing Springer, Singapore, pp. 319-329, 2018.
[17] R. Kalucha, & D. Goyal, “A review on artificial bee colony in MANET,” International Journal Computer Science Mobile Comput.,Vol. 3, no.7, pp.34-40, 2014.
[18] P. Visu, J. Janet, E. Kannan, & S. Koteeswaran,, “Optimal energy management in wireless adhoc network using Artificial Bee Colony based routing protocol,” European Journal of Scientific Research, Vol. 74, No. 2, pp.301-307, 2012.
[19] Y. Freund, & L. Mason, “The alternating decision tree learning algorithm,” In icml , Vol. 99, pp. 124-133, 1999.