Prevention of Gray Hole Attack Using ABC and Fuzzy Logic

Lokeshwar Singh, Ashish Sharma


There are many advantages and reasons for wireless sensor network to be popular. The key concern while establishing wireless sensor network (Mobile ad-hoc network) is the routing protocol to be applied. Routing process is the process of discovering the path that a data packet will follow to get it from the source node to the destination node. As the mobile ad-hoc network consists of mobile nodes with no controlling unit in which each and every step of communication is handled by the nodes within the network itself. The selection of routing protocol is one of the difficult tasks and the key challenge faced by the routing is the energy consumption issue apart from the others. In this research, the routing technique is developed with a basic focus on reduction of the energy consumption while improving the overall performance of the network.  Presently, various efficient routing protocols have been estimated for wireless sensor network. In the presence of malicious nodes, the network becomes penetrable to different kind of attacks. In wireless sensor network, routing-attacks are relatively serious. It has number of potential-applications in completely un-predictable in dynamic environment. Routing protocol utilized here are in a form of reactive-routing protocol known as OLSR. This routing protocol route is based on demand.

The proposed work has designed and implemented wireless sensor network in OLSR routing protocol. The gray hole attack is mitigated using Fuzzy Logic based on rule sets to have better routing process and ABC (Artificial Bee Colony) algorithm at superior rate for optimizing the route set at novel objective function.  In this work, the performance analysis of the network with the scenarios consisting 50 nodes moving with the speed of the 5-10m/s within the  area (1000X1000) mhas been done in regards to the parameters, namely, Throughput, End-to-End Delay, BER (bit error rate) and Energy consumption).  

Full Text:



Mark and J.W, “Evolution of wireless communications and networking,” in Quality of Service in Heterogeneous Wired/Wireless Networks, Second International Conference, pp.2 pp.-xxi, 24-24 Aug, 2005.

Akyildiz, I.F., Weilian Su, Sankarasubramaniam and Y. Cayirci, E., “A survey on sensor networks,” in Communications Magazine, IEEE, Vol.40, no.8, pp.102-114, Aug, 2002.

S. Xu and T. Saadawi, “Does the IEEE802.11 MAC protocol work well in multihop wireless ad hoc networks?”, IEEE Commun. Mag., Vol. 39, pp.130 -137 2001.

Toumpis, Stavros, Goldsmith and A.J., “Capacity regions for wireless ad hoc networks,” in Wireless Communications, IEEE Transactions on , Vol.2, no.4, pp.736-748, July 2003.

S. P. Dongare and R. S. Mangrulkar, “Implementing energy efficient technique for defense against Gray-Hole and Black-Hole attacks in wireless sensor networks,” International Conference on Advances in Computer Engineering and Applications, Ghaziabad, pp. 167-173, 2015.

Introduction to Wireless Sensor Networks. compsci/etextbook/6288/6288-chap1pdf, October, 2008

Vieira, M.A.M., Coelho C.N., da Silva, D.C., Jr., da Mataand J.M., “Survey on wireless sensor network devices,” in Emerging Technologies and Factory Automation, 2003. Proceedings. ETFA '03. IEEE Conference , Vol.1, pp.537-544, Sept. 2003

Ennaji, R., Boulmalf, M., “Routing in wireless sensor networks,” in Multimedia Computing and Systems, International Conference, pp.495-500, April 2009.

Raja Anwar, Majid Bakhtiari, Anazida Zainal, Abdul Hanan Abdullah and Kashif Naseer Qureshi “Security Issues and Attacks in Wireless Sensor Network”World Applied Sciences Journal 30 (10): 1224- 1227, 2014.

Weiwei Fang, Zhen Liu and Feng Liu, “A Cross-Layer Protocol For Reliable And Efficient Communication In Wireless Sensor Networks,” International Journal of Innovative Computing, Information and Control, Vol. 8, no. 18, October 2012.

Martin Engineer, “Energy-efficient communication in Wireless Sensor Networks ,” Network Architectures and Services, August 2012

Chellaprabha, B and S. Chenthur Pandian, “A Multipath Energy Efficient Congestion Control Scheme for Wireless Sensor Network,” Journal of Computer Science, Vol.8, no.6, pp. 943-950, 2012.

Selcuk Okdem and Dervis Karaboga, “Routing in Wireless Sensor Networks Using an Ant Colony Optimization (ACO),” Router Chip: In Sensors, 2009.

Shio Kumar Singh, M P Singh, and D K Singh, “Energy Efficient Homogenous Clustering Algorithm for Wireless Sensor Networks,” International Journal of Wireless & Mobile Networks (IJWMN), Vol.2, no.3, August 2010.

Y. Zhang, L. D. Kuhn and M. P. J. Fromherz, “Improvements on Ant Routing for Sensor Networks,” Springer-Verlag Berlin Heidelberg 2004, pp. 154-165, 2004.

Tiago Camilo, Carlos Carreto, Jorge Sa Silva and Fernando Boavida, “An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks”, Springer, 2006.

Rabiner, W.; Kulik, J. and Balakrishnan, H, “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,” In Proceedings of the Fifth Annual International Conference on Mobile Computing and Networking (MOBICOM), Seattle, WA, USA, pp. 174–185, August, 1999.

C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” Proceedings of ACM MobiCom, pp. 56-67, 2000.

Clausen, Thomas, and Philippe Jacquet, “Optimized link state routing protocol (OLSR)”, No. RFC 3626, 2003.

Mahfoudh, Saoucene, and Pascale Minet, “An energy efficient routing based on OLSR in wireless ad hoc and sensor networks,” 22nd International Conference on. IEEE, 2008.

Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani, “Routing Attacks in Wireless Sensor Networks: A Survey”, International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014.

Renold, A. Pravin, R. Poongothai, and R. Parthasarathy, “Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks,” Computer Communication and Informatics (ICCCI), IEEE, 2012.

Gupta, Indranil, Denis Riordan, and Srinivas Sampalli, “Cluster-head election using fuzzy logic for wireless sensor networks,” Communication Networks and Services Research Conference, Proceedings of the 3rd Annual, IEEE, 2005.

K.Venkatraman, J.Vijay Daniel, G.Murugaboopathi “Various Attacks in Wireless Sensor Network:Survey” International Journal of Soft Computing and Engineering, Vol.3, Issue-1, March 2013.

Taheri Hoda, Peyman Neamatollahi and Mohammah-H Yaghmaee “An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic,” Ad Hoc Networks, Vol. 10, no. 7, pp. 1469-1481, 2012.

Kapitanova, Krasimira, Sang H. Son, and Kyoung-Don Kang, “Using fuzzy logic for robust event detection in wireless sensor networks,” Ad Hoc Networks, Vol. 10, no. 4, pp. 709-722, 2012.

Kaplantzis, Sophia, Alistair Shilton, Nallasamy Mani and Y. Ahmet Sekercioglu, “Detecting selective forwarding attacks in wireless sensor networks using support vector machines,” Intelligent Sensors, Sensor Networks and Information, IEEE, 2007.

Yang, Zhang, Nirvana Meratnia, and Paul Havinga, “An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine,” Intelligent Sensors, Sensor Networks and Information Processing, International Conference on. IEEE, 2008.

Viani, Federico, F. Viani, L. Lizzi, P. Rocca, M. Benedetti, M. Donelli, and Andrea Massa, “Object tracking through RSSI measurements in wireless sensor networks,” Electronics Letters, Vol. 44, no.10, pp 653-654, 2010.

K Marigowda1 and Manjunath Shingadi, “Security Vulnerability Issues In Wireless Sensor Networks: A Short Survey”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.2, July 2013.

Vikash Kumar, Anshu Jain and P N Barwal, “ Wireless Sensor Networks: Security Issues, Challenges and Solutions,” International Journal of Information & Computation Technology, Vol. 4, pp. 859-868, 2014.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.