Volume 1, Issue 3, August 2013, Page: 61-67
Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control
A. Jaganraj, Arulmigu Meenakshi Amman College of Engineering, Near Kanchipuram, India
A. Yogaraj, Dept.,Veltech Dr.R.R & Dr.S.R Technical University, Avadi, Chennai, India
N. Vignesh, Dept., Veltech Multitech Engineering College, Avadi, Chennai, India
R. V. Anuroop, Dept.,Veltech Dr.R.R & Dr.S.R Technical University, Avadi, Chennai, India
Received: Jul. 20, 2013;       Published: Aug. 20, 2013
DOI: 10.11648/j.jeee.20130103.12      View  3031      Downloads  169
Abstract
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.
Keywords
Mobile Ad Hoc Networks, Intrusion Response, Risk Aware, D-S Theory
To cite this article
A. Jaganraj, A. Yogaraj, N. Vignesh, R. V. Anuroop, Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control, Journal of Electrical and Electronic Engineering. Vol. 1, No. 3, 2013, pp. 61-67. doi: 10.11648/j.jeee.20130103.12
Reference
[1]
Y. Sun, W. Yu, Z. Han, and K. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2,pp. 305-317, Feb.2006.
[2]
M. Refaei, L. DaSilva, M. Eltoweissy, and T. Nadeem, "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks," IEEE Trans. Computers, vol. 59, no. 5,pp. 707-719, May 2010.
[3]
P. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, and A.Reninger, "Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control," Proc. 28th IEEE Symp.Security and Privacy, 2007.
[4]
S. Wang, C. Tseng, K. Levitt, and M. Bishop, "Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks," Proc. 10th Int’l Symp. Recent Advances in Intrusion Detection (RAID ’07), pp. 127-145, 2007.
[5]
G. Shafer, A Mathematical Theory of Evidence. Princeton Univ., 1976.
[6]
L. Sun, R. Srivastava, and T. Mock, "An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions," J. Management Information Systems,vol. 22, no. 4, pp. 109-142, 2006.
[7]
C. Mu, X. Li, H. Huang, and S. Tian, "Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory," Proc. 13th European Symp. Research in Computer Security (ESORICS ’08),pp. 35-48, 2008.
[8]
K. Sentz and S. Ferson, "Combination of Evidence in Dempster-Shafer Theory," technical report, Sandia Nat’l Laboratories, 2002.
[9]
L. Zadeh, "Review of a Mathematical Theory of Evidence," AIMagazine, vol. 5, no. 3, p. 81, 1984.
[10]
R. Yager, "On the Dempster-Shafer Framework and New Combination Rules_1," Information Sciences, vol. 41, no. 2, pp. 93- 137, 1987.
[11]
H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, "Sensor Fusion Using Dempster-Shafer Theory," Proc. IEEE Instrumentation and Measurement Technology Conf., vol. 1, pp. 7-12, 2002.
[12]
T. Clausen and P. Jacquet, "Optimized Link State Routing Protocol," Network Working Group, 2003.
[13]
C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc On-Demand Distance Vector Routing," Mobile Ad-Hoc Network Working Group,vol. 3561, 2003.
Browse journals by subject