Minimizing Routing Attacks in MANET Using Extended Dempster-Shefer Theory

نویسندگان

  • A. V. R. Sandesh Guptha
  • S. Reshma
چکیده

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or na ı̈ve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and na ı̈ve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk aware approach is based on an extended DempsterShafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics. Route request flooding attack is one such distributed DoS attack, launched by compromised nodes or intruders. This triggers an acute need of flooding attack prevention mechanisms for this highly vulnerable type of network. In this paper, a reputation based scheme is proposed to resist the impact of flooding attack in MANET. This scheme observes the behavior of a node in the network periodically and limits its route request sending rate accordingly.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mitigation with Distributed Node Control

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

متن کامل

Risk-Aware Response Mechanism with Extended D-S theory

Mobile Ad hoc Networks (MANET) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because its changing the whole topology itself and it causes more damage to MANET. Even there are lot of intrusion detection Systems available to diminish those critical attacks, existing causesunexpe...

متن کامل

Intrusion Response with Dempster Shafer theory of evidence to detect and overcome routing attack in Mobile Ad hoc Networks

Mobile Ad hoc Networks are extremely exposed to attacks because of the self-motivated nature of its network infrastructure. Out of all these attacks, routing attacks need sizeable attention since it could root the most upsetting harm to MANET. There exist several intrusion response techniques to mitigate such critical attacks, still the existing solutions typically attempt to isolate malicious ...

متن کامل

Risk-Aware Mitigation

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

متن کامل

محاسبه فاصله عدم قطعیت بر پایه آنتروپی شانون و تئوری دمپستر-شافر از شواهد

Abstract Dempster Shafer theory is the most important method of reviewing uncertainty for information system. This theory as introduced by Dempster using the concept of upper and lower probabilities extended later by Shafer. Another important application of entropy as a basic concept in the information theory  can be used as a uncertainty measurement of the system in specific situation In th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013