Minimizing Routing Attacks in MANET Using Extended Dempster-Shefer Theory
نویسندگان
چکیده
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or na ı̈ve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and na ı̈ve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk aware approach is based on an extended DempsterShafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics. Route request flooding attack is one such distributed DoS attack, launched by compromised nodes or intruders. This triggers an acute need of flooding attack prevention mechanisms for this highly vulnerable type of network. In this paper, a reputation based scheme is proposed to resist the impact of flooding attack in MANET. This scheme observes the behavior of a node in the network periodically and limits its route request sending rate accordingly.
منابع مشابه
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mitigation with Distributed Node Control
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...
متن کاملRisk-Aware Response Mechanism with Extended D-S theory
Mobile Ad hoc Networks (MANET) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because its changing the whole topology itself and it causes more damage to MANET. Even there are lot of intrusion detection Systems available to diminish those critical attacks, existing causesunexpe...
متن کاملIntrusion Response with Dempster Shafer theory of evidence to detect and overcome routing attack in Mobile Ad hoc Networks
Mobile Ad hoc Networks are extremely exposed to attacks because of the self-motivated nature of its network infrastructure. Out of all these attacks, routing attacks need sizeable attention since it could root the most upsetting harm to MANET. There exist several intrusion response techniques to mitigate such critical attacks, still the existing solutions typically attempt to isolate malicious ...
متن کاملRisk-Aware Mitigation
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...
متن کاملمحاسبه فاصله عدم قطعیت بر پایه آنتروپی شانون و تئوری دمپستر-شافر از شواهد
Abstract Dempster Shafer theory is the most important method of reviewing uncertainty for information system. This theory as introduced by Dempster using the concept of upper and lower probabilities extended later by Shafer. Another important application of entropy as a basic concept in the information theory can be used as a uncertainty measurement of the system in specific situation In th...
متن کامل