Risk-Aware Response Mechanism with Extended D-S theory

نویسنده

  • G. Nirmala
چکیده

Mobile Ad hoc Networks (MANET) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because its changing the whole topology itself and it causes more damage to MANET. Even there are lot of intrusion detection Systems available to diminish those critical attacks, existing causesunexpected network partition, and causes additional damages to the infrastructure of the network , and it leads to uncertainty in finding routing attacks in MANET. In this paper, we propose a adaptive risk-aware response mechanism with extended Dempster-Shafer theory in MANET to identify the routing attacks and malicious node. Our techniques find the malicious node with degree of evidence from the expert knowledge and detect the important factors for each node.It creates black list and all those malicious nodes so that it may not enter the network again

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mitigation with Distributed Node Control

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

متن کامل

A Kind of Context-aware Computing Approach for Proactive Service

We focus on modeling and computing of aware context with uncertainty for making dynamic decision during seamless mobile service. We re-examine formalism of random set, which is not finite-set statistics (FISST), argue the limitations of the direct numerical approaches, give new modeling mode based on random sets theory (RST) for aware context, and propose our computing approach of modeled aware...

متن کامل

Minimizing Routing Attacks in MANET Using Extended Dempster-Shefer Theory

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

متن کامل

Theoretical Investigation of the Reaction Mechanism for a Type of N-heterocyclic Compound Involving Mono-N-aryl-3-aminodihydropyrrol

The kinetics of reaction between 4-methylaniline (1), dimethyl acetylenedicarboxylate (2) and formaldehyde (4) has been theoretically investigated to gain further insight into the reaction mechanism. The results of theoretical calculations were achieved using the ab initio method at the HF/6-311g (d, p) level of theory in gas phase. The mechanism of this reaction had 5 steps. Theoretical kineti...

متن کامل

Risk-Aware Mitigation

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013