Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.
Published in | Journal of Electrical and Electronic Engineering (Volume 1, Issue 3) |
DOI | 10.11648/j.jeee.20130103.12 |
Page(s) | 61-67 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2013. Published by Science Publishing Group |
Mobile Ad Hoc Networks, Intrusion Response, Risk Aware, D-S Theory
[1] | Y. Sun, W. Yu, Z. Han, and K. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2,pp. 305-317, Feb.2006. |
[2] | M. Refaei, L. DaSilva, M. Eltoweissy, and T. Nadeem, "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks," IEEE Trans. Computers, vol. 59, no. 5,pp. 707-719, May 2010. |
[3] | P. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, and A.Reninger, "Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control," Proc. 28th IEEE Symp.Security and Privacy, 2007. |
[4] | S. Wang, C. Tseng, K. Levitt, and M. Bishop, "Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks," Proc. 10th Int’l Symp. Recent Advances in Intrusion Detection (RAID ’07), pp. 127-145, 2007. |
[5] | G. Shafer, A Mathematical Theory of Evidence. Princeton Univ., 1976. |
[6] | L. Sun, R. Srivastava, and T. Mock, "An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions," J. Management Information Systems,vol. 22, no. 4, pp. 109-142, 2006. |
[7] | C. Mu, X. Li, H. Huang, and S. Tian, "Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory," Proc. 13th European Symp. Research in Computer Security (ESORICS ’08),pp. 35-48, 2008. |
[8] | K. Sentz and S. Ferson, "Combination of Evidence in Dempster-Shafer Theory," technical report, Sandia Nat’l Laboratories, 2002. |
[9] | L. Zadeh, "Review of a Mathematical Theory of Evidence," AIMagazine, vol. 5, no. 3, p. 81, 1984. |
[10] | R. Yager, "On the Dempster-Shafer Framework and New Combination Rules_1," Information Sciences, vol. 41, no. 2, pp. 93- 137, 1987. |
[11] | H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, "Sensor Fusion Using Dempster-Shafer Theory," Proc. IEEE Instrumentation and Measurement Technology Conf., vol. 1, pp. 7-12, 2002. |
[12] | T. Clausen and P. Jacquet, "Optimized Link State Routing Protocol," Network Working Group, 2003. |
[13] | C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc On-Demand Distance Vector Routing," Mobile Ad-Hoc Network Working Group,vol. 3561, 2003. |
APA Style
A. Jaganraj, A. Yogaraj, N. Vignesh, R. V. Anuroop. (2013). Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control. Journal of Electrical and Electronic Engineering, 1(3), 61-67. https://doi.org/10.11648/j.jeee.20130103.12
ACS Style
A. Jaganraj; A. Yogaraj; N. Vignesh; R. V. Anuroop. Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control. J. Electr. Electron. Eng. 2013, 1(3), 61-67. doi: 10.11648/j.jeee.20130103.12
AMA Style
A. Jaganraj, A. Yogaraj, N. Vignesh, R. V. Anuroop. Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control. J Electr Electron Eng. 2013;1(3):61-67. doi: 10.11648/j.jeee.20130103.12
@article{10.11648/j.jeee.20130103.12, author = {A. Jaganraj and A. Yogaraj and N. Vignesh and R. V. Anuroop}, title = {Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control}, journal = {Journal of Electrical and Electronic Engineering}, volume = {1}, number = {3}, pages = {61-67}, doi = {10.11648/j.jeee.20130103.12}, url = {https://doi.org/10.11648/j.jeee.20130103.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.jeee.20130103.12}, abstract = {Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.}, year = {2013} }
TY - JOUR T1 - Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control AU - A. Jaganraj AU - A. Yogaraj AU - N. Vignesh AU - R. V. Anuroop Y1 - 2013/08/20 PY - 2013 N1 - https://doi.org/10.11648/j.jeee.20130103.12 DO - 10.11648/j.jeee.20130103.12 T2 - Journal of Electrical and Electronic Engineering JF - Journal of Electrical and Electronic Engineering JO - Journal of Electrical and Electronic Engineering SP - 61 EP - 67 PB - Science Publishing Group SN - 2329-1605 UR - https://doi.org/10.11648/j.jeee.20130103.12 AB - Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics. VL - 1 IS - 3 ER -