Mitigating Routing Attacks in Mobile Ad Hoc Networks
DOI:
https://doi.org/10.31686/ijier.vol7.iss7.1603Keywords:
Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance VectorAbstract
Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the identified routing attacks. To avoid the routing attacks Dijkstra’s and Destination sequenced Distance Vector algorithm are used. Dijkstra's algorithm solves the single-source shortest-path problem when all edges have non-negative weights. The primary improvement for ad hoc networks made in DSDV over conventional distance vector is the addition of a sequence number in each routing table entry.
Index Terms - Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector.
References
Uzma Shaikh , Arokia Paul Rajan , Intrusion detection and avoidance of black and grey hole attacks using AODV protocol based MANET , International Journal of Engineering & Technology, 7 (1.2) (2018) 110-116 . DOI: https://doi.org/10.14419/ijet.v7i1.2.9020
Y. Sun, W. Yu, Z. Han, and K. Liu, “Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006. DOI: https://doi.org/10.1109/JSAC.2005.861389
Hui Wang and Sally McClean, “Deriving Evidence Theoretical Functions in Multivariate Data Spaces : A Systematic Approach,” IEEE Transactions on Systems, vol. 38, No. 2, APRIL 2008. DOI: https://doi.org/10.1109/TSMCB.2007.913593
Viswa Jhananie K.R , An Efficient Algorithm for Detecting and Removing Black hole Attack for Secure Routing in Mobile Ad-hoc Network , International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 5 (2016) .
Mojtaba GhanaatPisheh Sanaei , Imran Ghani , Aida Hakemi , Seung Ryul Jeong , Routing Attacks in Mobile ad hoc Networks : an overview , 123Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru 81300, Malaysia 45School of Business Information Technology, Kookmin University, Korea . Sci.Int.(Lahore),25(4),1031-1034,2013 ISSN 1013-5316; CODEN: SINTE 8 1031
Khaleel Ur Rahman, A Venu Gopal Reddy and Rafi U Zamen, “An Efficient Destination Sequenced Distance Vector Routing Protocol for Mobile Ad Hoc Networks,” International Conference on Computer Science 2008. DOI: https://doi.org/10.1109/ICCSIT.2008.122
Sagar R Deshmukh , P N Chatur , Nikhil B Bhople , AODV-Based Secure Routing Against Blackhole Attack in MANET, IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India . DOI: https://doi.org/10.1109/RTEICT.2016.7808179
B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “ A Survey of Routing Attacks in Mobile Ad Hoc Networks,”IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85- 91,Oct 2007. DOI: https://doi.org/10.1109/MWC.2007.4396947
S. S. Jadhav, A. V. Kulkarni , R. Menon, "Mobile Ad-Hoc Network (MANET) for disaster management," 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), Vijayawada, 2014, pp. 1-5. DOI: https://doi.org/10.1109/WOCN.2014.6923074
Downloads
Published
Issue
Section
License
Copyright (c) 2019 Ahmed Elkabour, Rahma Teirab Abaker Haroun
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author for more visit Copyright & License.