Malicious Node Detection on Routing Via Certificate Authority and Optimal Fuzzy for Wireless Ad-Hoc Network
Rajkumar. K1, M. K. Jeyakumar2

1Rajkumar.K, Research Scholar, Dept. of Computer Science and Engineering , Noorul islam Centre for Higher Education, Kumaracoil-629180, Tamilnad,India.
2Dr. M. K. Jeyakumar, Professor, Dept. of Computer Applications, Noorul islam Centre for Higher Education, Kumaracoil-629180, Tamilnadu. India.

Manuscript received on 2 August 2019. | Revised Manuscript received on 8 August 2019. | Manuscript published on 30 September 2019. | PP: 1761-1769 | Volume-8 Issue-3 September 2019 | Retrieval Number: C4601098319/19©BEIESP | DOI: 10.35940/ijrte.C4601.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Wireless Ad-Hoc network has a set of nodes which designed with wireless transceivers. These nodes communicate with each other by accessing the common channel. In the ad-hoc network, security is one of the main challenges. Due to the behavior of malicious nodes, the security of the network is compromised. So, the major objective of this paper is to improve the security of the network by combining both malicious node detection and cryptography techniques. In this paper, an optimized fuzzy system is presented for the detection of malicious nodes which are malfunctioning in the routing path between source and destination. To optimize the performance of the fuzzy system, Particle Swarm Optimization (PSO) algorithm is presented. After the detection of malicious nodes, each normal behavior node in the network is authenticated by the Certificate Authority (CA). Then the authenticated nodes transmit the data packets to the destination with the Elliptic Curve Cryptography (ECC) algorithm. Simulation results show that the performance of the optimized fuzzy system is improved than that of the conventional fuzzy system for malicious node detection in terms of delivery ratio, detection time and energy efficiency.
Keywords: Wireless Ad-Hoc network, optimized fuzzy system, Particle Swarm Optimization (PSO), Certificate Authority (CA) and Elliptic Curve Cryptography (ECC).

Scope of the Article:
Routing, Switching and Addressing Techniques