Research Article
Cluster Head Based Intrusion Detection System for Black Hole Attacks in Wireless Ad Hoc Networks using 2 Level Fuzzy Logic System
@INPROCEEDINGS{10.4108/eai.7-6-2021.2308789, author={Christeena Joseph and P.C. Kishoreraja and Radhika Baskar}, title={Cluster Head Based Intrusion Detection System for Black Hole Attacks in Wireless Ad Hoc Networks using 2 Level Fuzzy Logic System}, proceedings={Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India}, publisher={EAI}, proceedings_a={I3CAC}, year={2021}, month={6}, keywords={adhoc networks blackhole attacks cluster head ids fuzzy logic}, doi={10.4108/eai.7-6-2021.2308789} }
- Christeena Joseph
P.C. Kishoreraja
Radhika Baskar
Year: 2021
Cluster Head Based Intrusion Detection System for Black Hole Attacks in Wireless Ad Hoc Networks using 2 Level Fuzzy Logic System
I3CAC
EAI
DOI: 10.4108/eai.7-6-2021.2308789
Abstract
Ad hoc networks are autonomous and infrastructure-less wireless systems where nodes act as routers and hosts. Security is the primary issue for the functionality of these networks. Security for ad hoc networks can be incorporated by prevention and detection mechanisms. This research work focuses on a two-level fuzzy-based intrusion detection system for identifying black hole attacks in ad hoc networks. This method can reduce the complexity of the rule base of the fuzzy inference system. To reduce the complexity of detection, communication overhead and to make the detection scheme energy efficient, further, a cluster-head-based intrusion detection system is designed and implemented. The impact on network performance with no attack, with black hole attack, and with intrusion detection scheme deployed in all nodes and cluster heads are analyzed. The proposed cluster-based 2 level fuzzy logic intrusion detection mechanism was able to achieve the detection rate and accuracy to a maximum of 100%,false alarm rate to 0% and detection delay to in varying attacker scenario.