| Peer-Reviewed

Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control

Received: 20 July 2013     Published: 20 August 2013
Views:       Downloads:
Abstract

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.

Published in Journal of Electrical and Electronic Engineering (Volume 1, Issue 3)
DOI 10.11648/j.jeee.20130103.12
Page(s) 61-67
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2013. Published by Science Publishing Group

Keywords

Mobile Ad Hoc Networks, Intrusion Response, Risk Aware, D-S Theory

References
[1] Y. Sun, W. Yu, Z. Han, and K. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2,pp. 305-317, Feb.2006.
[2] M. Refaei, L. DaSilva, M. Eltoweissy, and T. Nadeem, "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks," IEEE Trans. Computers, vol. 59, no. 5,pp. 707-719, May 2010.
[3] P. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, and A.Reninger, "Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control," Proc. 28th IEEE Symp.Security and Privacy, 2007.
[4] S. Wang, C. Tseng, K. Levitt, and M. Bishop, "Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks," Proc. 10th Int’l Symp. Recent Advances in Intrusion Detection (RAID ’07), pp. 127-145, 2007.
[5] G. Shafer, A Mathematical Theory of Evidence. Princeton Univ., 1976.
[6] L. Sun, R. Srivastava, and T. Mock, "An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions," J. Management Information Systems,vol. 22, no. 4, pp. 109-142, 2006.
[7] C. Mu, X. Li, H. Huang, and S. Tian, "Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory," Proc. 13th European Symp. Research in Computer Security (ESORICS ’08),pp. 35-48, 2008.
[8] K. Sentz and S. Ferson, "Combination of Evidence in Dempster-Shafer Theory," technical report, Sandia Nat’l Laboratories, 2002.
[9] L. Zadeh, "Review of a Mathematical Theory of Evidence," AIMagazine, vol. 5, no. 3, p. 81, 1984.
[10] R. Yager, "On the Dempster-Shafer Framework and New Combination Rules_1," Information Sciences, vol. 41, no. 2, pp. 93- 137, 1987.
[11] H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, "Sensor Fusion Using Dempster-Shafer Theory," Proc. IEEE Instrumentation and Measurement Technology Conf., vol. 1, pp. 7-12, 2002.
[12] T. Clausen and P. Jacquet, "Optimized Link State Routing Protocol," Network Working Group, 2003.
[13] C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc On-Demand Distance Vector Routing," Mobile Ad-Hoc Network Working Group,vol. 3561, 2003.
Cite This Article
  • APA Style

    A. Jaganraj, A. Yogaraj, N. Vignesh, R. V. Anuroop. (2013). Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control. Journal of Electrical and Electronic Engineering, 1(3), 61-67. https://doi.org/10.11648/j.jeee.20130103.12

    Copy | Download

    ACS Style

    A. Jaganraj; A. Yogaraj; N. Vignesh; R. V. Anuroop. Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control. J. Electr. Electron. Eng. 2013, 1(3), 61-67. doi: 10.11648/j.jeee.20130103.12

    Copy | Download

    AMA Style

    A. Jaganraj, A. Yogaraj, N. Vignesh, R. V. Anuroop. Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control. J Electr Electron Eng. 2013;1(3):61-67. doi: 10.11648/j.jeee.20130103.12

    Copy | Download

  • @article{10.11648/j.jeee.20130103.12,
      author = {A. Jaganraj and A. Yogaraj and N. Vignesh and R. V. Anuroop},
      title = {Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control},
      journal = {Journal of Electrical and Electronic Engineering},
      volume = {1},
      number = {3},
      pages = {61-67},
      doi = {10.11648/j.jeee.20130103.12},
      url = {https://doi.org/10.11648/j.jeee.20130103.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.jeee.20130103.12},
      abstract = {Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.},
     year = {2013}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control
    AU  - A. Jaganraj
    AU  - A. Yogaraj
    AU  - N. Vignesh
    AU  - R. V. Anuroop
    Y1  - 2013/08/20
    PY  - 2013
    N1  - https://doi.org/10.11648/j.jeee.20130103.12
    DO  - 10.11648/j.jeee.20130103.12
    T2  - Journal of Electrical and Electronic Engineering
    JF  - Journal of Electrical and Electronic Engineering
    JO  - Journal of Electrical and Electronic Engineering
    SP  - 61
    EP  - 67
    PB  - Science Publishing Group
    SN  - 2329-1605
    UR  - https://doi.org/10.11648/j.jeee.20130103.12
    AB  - Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.
    VL  - 1
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Arulmigu Meenakshi Amman College of Engineering, Near Kanchipuram, India

  • Dept.,Veltech Dr.R.R & Dr.S.R Technical University, Avadi, Chennai, India

  • Dept., Veltech Multitech Engineering College, Avadi, Chennai, India

  • Dept.,Veltech Dr.R.R & Dr.S.R Technical University, Avadi, Chennai, India

  • Sections