SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2577-2580 ISSN: 2249-6645
www.ijmer.com 2577 | Page
Shaik Silarbi1
, G. Sridevi2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India
2
Assoc. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India
Abstract: Mobile Ad Hoc Networks (MANET) are a distributed and self configuring wireless networks. MANETs does not
have a predefined network infrastructure. Application of MANET is benefited in areas such as disaster relief, military
services and mine site operations. Each node communicates with the other acting nodes as routers. The co-operation and
trust between the nodes are depended for the proper functioning of MANET. Being the flexible network, MANET is exposed
to various types of attacks especially the routing attacks. There are various methods introduced to mitigate such critical
routing attacks. In this paper, we propose a risk-aware response mechanism to systematically cope with the routing attacks
in MANET, proposing an adaptive time-wise isolation method. Our risk-aware approach is based on the extended Dempster-
Shafer (D-S) evidence model. D-S theory has been adopted as a valuable tool for evaluating the reliability and security in
information systems and by other engineering fields, where precise measurement is impossible to obtain or expert elicitation
is required.
Keywords: D- S theory, MANET, Routing attack.
I. INTRODUCTION
Mobile Ad Hoc Networks (MANET)[1] (Figure 1) is distributed and self configuring wireless network. MANETs
does not have a predefined network infrastructure. Application of MANET is benefited in areas such as disaster relief,
military services and mine site operations. Each node communicates with the other nodes acting as routers. The co-operation
and trust between the nodes are depended for the proper functioning of MANET. Since the network topology in MANET
changes unpredictably and rapidly it is highly vulnerable to various types of attacks. Attack prevention methods such as
authentication and encryption, intrusion detection system, intrusion prevention can be used in defense for reducing certain
attack possibilities. MANET is considered one of the most promising fields in both research and development of wireless
networks. There exist many intrusion response mechanisms for the routing attacks. The existing techniques usually attempt
to isolate the vulnerable nodes from the topology there by causing the partition of network topology.
Methods such as binary responses may result in the unexpected network partition, thereby causing additional
damages to the network infrastructure, and naive fuzzy responses could lead to uncertainty in countering routing attacks in
MANET. Several intrusion detection techniques have been introduced for detecting the vulnerable nodes and preventing the
neighbor nodes compromised by the malicious nodes. Even though several mechanisms and routing protocols are introduced
each of them has one or more vulnerabilities. Research on the MANETs and implementation has become a huge amount of
task to be done. When a malicious node is being identified then the node has to be either repaired or another route has to be
established. In most of the existing techniques the nodes when found slightly malicious is completely isolated from the entire
network which will make splitting of the network and thereby causing communication problems between the nodes.
Figure 1: An Example MANET
II. RELATED WORK
In [2], the authors propose the ariadne protocol for preventing the attacks against the networks. An ad hoc network
is a group of wireless mobile computers or nodes, in which individual nodes cooperate by forwarding packets for each other
to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally
studied the routing problem in a non-adversarial setting, thereby assuming a trusted environment. Here routing attacks are
An Optimal Risk- Aware Mechanism for Countering
Routing Attacks in MANETs
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2577-2580 ISSN: 2249-6645
www.ijmer.com 2578 | Page
presented against routing in ad hoc networks, and the design and performance evaluation of a new secure on-demand ad hoc
network routing protocol is presented i.e. called Ariadne. Ariadne [2] prevents compromised nodes or attackers from
tampering with uncompromised routes consisting of uncompromised nodes, and also prevents a large number of types of
Denial-of-Service (DOS) attacks.
In [3], the authors has presented the Secure Efficient Ad hoc Distance vector routing protocol (SEAD) mechanism
to guard against the DoS attacks. An ad hoc network is a collection of wireless computers or nodes, communicating among
themselves over possibly multi- hop paths, without the help of any infrastructure such as base stations or access points. In [4],
the authors proposed a vector model for all security services rely to a great extent on some notion of trust. However, even
today, there is no accepted technique or formalism for the specification of trust and for reasoning about trust. In [5], the
authors developed an alternative methodology for the risk analysis of information systems security (ISS), an evidential
reasoning approach under the Dempster-Shafer theory of belief functions. In [6], the authors has proposed the cooperative
enforcement approach. Ad hoc networks rely on the co- operation of the nodes [6] participating in the network to forward
packets for each other. A node may decide not to co- operate to save all its resources while still using the network to relay its
traffic. If too many nodes exhibit this behaviour, the network performance degrades and cooperating nodes may find
themselves unfairly loaded. If a node observes another node that not participating correctly, it reports this observation to
other nodes who then take action to avoid being affected and potentially punish the bad node by refusing to forward its
traffic.
III. PROPOSED WORK
A. Risk- aware Response Mechanism
In this section, we have a tendency to articulate an adjustive risk-aware response method supported quantitative risk
estimation and risk tolerance. Rather than applying easy binary isolation of the malicious nodes, our approach adopts an
isolation mechanism in a very temporal manner supported the danger price. We have a tendency to tend to perform risk
assessment with the extended D-S proof theory introduced in for every routing attacks and corresponding countermeasures to
make extra correct response picks illustrated in Figure 2.
Figure 2: Risk-aware response mechanism
Evident Collection: In this step Intrusion Detection System (IDS) provides associate degree attack alert with a confidence
price, and so the routing Table modification Detector (RTCD) runs to work out what percentage changes on routing table
area unit caused by the attack.
Risk Evaluation: Alert confidence from IDS and therefore the routing table would be an additional thought-about as
freelance evidences for risk calculation and combined with the extended D-S theory. Risk of countermeasures is calculated
moreover throughout the risk assessment section, supported the danger of routing attacks and thus the chance of
countermeasures, the whole risk of associate attack is also discovered.
Decision Creating: The accommodative decision module provides a flexible response decision making method, that takes
risk estimation and risk tolerance into consideration, to control the temporary isolation level, a user can set fully totally
different thresholds to satisfy her goal.
Intrusion Response: With the output from the risk assessment and decision-making module, the corresponding response
actions, at the side of the routing table recovery and node isolation, administered to mitigate attack damages throughout a
distributed manner.
B. Response to Routing attacks
In this approach, we use two different responses to deal with different attack methods: routing table recovery and
the node isolation. Routing table recovery includes the local routing table recovery and global routing recovery. Local
routing recovery is performed by the victim nodes that detect the attack and automatically recover its own routing table.
Node isolation may be the most intuitive way to prevent further routing attacks from being launched by malicious nodes in
MANET. To perform a node isolation response, the neighbors of the malicious nodes ignore the malicious node by neither
forwarding packets through it nor accepting any network packets from it. Figure 3 shows an example scenario where nodes 2
to 0 are supposed to go through Nodes 3 and 5. Suppose a malicious node 1 advertises a fake link to node 0 and then it
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2577-2580 ISSN: 2249-6645
www.ijmer.com 2579 | Page
would also cause all other nodes to update its routing table accordingly. As a result the data from Nodes 2 to 0 travels Node
1 rather than nodes 2 and 4 and Node 1 can manipulate and drop the traffic between Nodes 2 to 0.
Figure 3: Example scenario
C. Risk Assessment
In risk assessment step, alert confidence from IDS and RTDC would be considered as different evidences and these
two evidences combined using Dempster’s rule of combination with the importance factors (DRCIF) algorithm. It provides
entire risk of attack. Security state of the MANET can be classified into two categories. {Secure, Insecure} which means
security state of MANET could be either secure or insecure. Risk of MANET could be represent by belief function called
Bel{Insecure}. The algorithm for combination of the multiple evidences is constructed as follows:
Algorithm MUL-EDS-CMB
INPUT: Evidence pool Ep
OUTPUT: One evidence
1 |Ep|= sizeof(Ep);
2 While |Ep| > 1 do
3 Pick two evidences with the least IF in Ep, named E1 and
E2;
4 Combine these two evidences,E= <m1  m2, (IF1+
IF2)/2>;
5 Remove E1 and E2 from Ep;
6 Add E to Ep;
7 end
8 return the evidence in Ep
D. Adaptive Decision Making
ADM (Adaptive Decision Making) technique is used to provide a flexible response decision making method when
it gets attack alert. Our adaptive decision making module is based on the quantitative risk estimation and risk tolerance,
which is shown in Figure 4. The response level is additionally splitted into multiple bands. Each band is associated with an
isolation degree, which presents a different time interval of the isolation action. The response action and the band boundaries
are all determined in accordance with risk tolerance and can be changed when risk tolerance threshold changes. The upper
risk tolerance threshold (UT) would be associated with the permanent isolation response. The lower risk tolerance threshold
(LT) will remain each node intact. The band between the upper tolerance threshold and lower tolerance threshold is
associated with a temporary isolation response, in which the isolation time “T” changes dynamically based on the different
response level given by
and
where “n” is the number of bands and i is the corresponding isolation band.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2577-2580 ISSN: 2249-6645
www.ijmer.com 2580 | Page
Figure 4: Adaptive decision making
IV. CONCLUSIONS
Mobile ad hoc network (MANET) is a collection of mobile nodes without the required intervention of any existing
infrastructure or centralized access point such as a base station. MANET has the dynamic infrastructure hence it is highly
vulnerable to various attacks. Several attacks are possible in MANET networks and among them the routing attack could
cause the worst damage. There are several solutions available for mitigating such routing attacks. In this paper, we propose
an adaptive risk-aware response mechanism with the extended D-S evidence model, considering damages caused by both
attacks and their countermeasures. The adaptiveness of our method allows us to systematically cope with MANET routing
attacks.
REFERENCES
[1] S. Wang, C. Tseng, K. Levitt, and M. Bishop, ―Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks,‖ Proc. 10th
Int’l Symp. Recent Advances in Intrusion Detection (RAIDf’07), pp. 127- 145, 2007.
[2] Hu, Y.C., Perrig, A. and Johnson, D.B. (2002), “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,”
Proceedings of 8th Annual International Conference on Mobile Computing and Networking (MobiCom’02), ACM Press, pp.12–
23.
[3] Hu, Y.C., Perrig, A. and Johnson, D.B. (2002), “Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks,”
4th IEEE Workshop Mobile Computing Systems and Applications (WMCSA’02), pp.3-13.
[4] Ray and Chakraborty, S. (2004). “A vector model of trust for developing trustworthy systems,” European Symposium on Research
in Computer Security, September, pp. 260–275.
[5] L. Sun, R. Srivastava, and T. Mock (2006), “An Information Systems Security Risk Assessment Model under the Dempster-Shafer
Theory of Belief Functions,” J. Management Information Systems, vol. 22, no. 4, pp. 109-142.
[6] Bansal, S. and Baker (2003), “Observation-Based Cooperation Enforcement in Ad Hoc Networks,” Technical Report
cs.NI/0307012, Stanford University, Vol.1, No.2, pp.1-10.

More Related Content

What's hot

An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
 
Investigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetInvestigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetijctet
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
 
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...ijcseit
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionUvaraj Shan
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)CSCJournals
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
A survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networksA survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networkseSAT Journals
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKCROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKIJNSA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsA survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsKhaleel Husain
 

What's hot (18)

An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor Networks
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
M026075079
M026075079M026075079
M026075079
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
 
Investigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetInvestigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manet
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
A survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networksA survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networks
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKCROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsA survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manets
 

Viewers also liked

Picture powerpoint
Picture powerpointPicture powerpoint
Picture powerpointpadisav17
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
Intranetizen IIC12: how to ensure project faillure
Intranetizen IIC12: how to ensure project faillureIntranetizen IIC12: how to ensure project faillure
Intranetizen IIC12: how to ensure project faillureIntranetizen
 
ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56andrea_matinfo56ETM
 
Sweet charity original
Sweet charity originalSweet charity original
Sweet charity originalbooksnbeans
 
Design and Analysis of Canister Testing Chamber
Design and Analysis of Canister Testing ChamberDesign and Analysis of Canister Testing Chamber
Design and Analysis of Canister Testing ChamberIJMER
 
Detection of Stall Region during Testing of Compressor
Detection of Stall Region during Testing of CompressorDetection of Stall Region during Testing of Compressor
Detection of Stall Region during Testing of CompressorIJMER
 
Ρωμιοσύνη
ΡωμιοσύνηΡωμιοσύνη
ΡωμιοσύνηPopi Kaza
 
Dl3211461149
Dl3211461149Dl3211461149
Dl3211461149IJMER
 
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pan...
Development of a Smart Mechatronic Tracking System to  Enhance Solar Cell Pan...Development of a Smart Mechatronic Tracking System to  Enhance Solar Cell Pan...
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pan...IJMER
 
Ijmer 46046266
Ijmer 46046266Ijmer 46046266
Ijmer 46046266IJMER
 
Trough External Service Management Improve Quality & Productivity
Trough External Service Management Improve Quality & ProductivityTrough External Service Management Improve Quality & Productivity
Trough External Service Management Improve Quality & ProductivityIJMER
 
At2419231928
At2419231928At2419231928
At2419231928IJMER
 
Effective Devops - Velocity New York 2015
Effective Devops - Velocity New York 2015 Effective Devops - Velocity New York 2015
Effective Devops - Velocity New York 2015 Jennifer Davis
 
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...IJMER
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques IJMER
 
Acc 561 final exam
Acc 561 final examAcc 561 final exam
Acc 561 final examliam111221
 

Viewers also liked (20)

Picture powerpoint
Picture powerpointPicture powerpoint
Picture powerpoint
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
Intranetizen IIC12: how to ensure project faillure
Intranetizen IIC12: how to ensure project faillureIntranetizen IIC12: how to ensure project faillure
Intranetizen IIC12: how to ensure project faillure
 
ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56
 
Sweet charity original
Sweet charity originalSweet charity original
Sweet charity original
 
Design and Analysis of Canister Testing Chamber
Design and Analysis of Canister Testing ChamberDesign and Analysis of Canister Testing Chamber
Design and Analysis of Canister Testing Chamber
 
Detection of Stall Region during Testing of Compressor
Detection of Stall Region during Testing of CompressorDetection of Stall Region during Testing of Compressor
Detection of Stall Region during Testing of Compressor
 
Ρωμιοσύνη
ΡωμιοσύνηΡωμιοσύνη
Ρωμιοσύνη
 
Dl3211461149
Dl3211461149Dl3211461149
Dl3211461149
 
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pan...
Development of a Smart Mechatronic Tracking System to  Enhance Solar Cell Pan...Development of a Smart Mechatronic Tracking System to  Enhance Solar Cell Pan...
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pan...
 
Ijmer 46046266
Ijmer 46046266Ijmer 46046266
Ijmer 46046266
 
Trough External Service Management Improve Quality & Productivity
Trough External Service Management Improve Quality & ProductivityTrough External Service Management Improve Quality & Productivity
Trough External Service Management Improve Quality & Productivity
 
At2419231928
At2419231928At2419231928
At2419231928
 
Juan cruz y alan power
Juan cruz y alan powerJuan cruz y alan power
Juan cruz y alan power
 
Effective Devops - Velocity New York 2015
Effective Devops - Velocity New York 2015 Effective Devops - Velocity New York 2015
Effective Devops - Velocity New York 2015
 
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
 
London
LondonLondon
London
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
Acc 561 final exam
Acc 561 final examAcc 561 final exam
Acc 561 final exam
 
South africa
South africaSouth africa
South africa
 

Similar to An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs

A Study on -Risk Aware Mitigation for MANET Routing Attacks
A Study on -Risk Aware Mitigation for MANET Routing AttacksA Study on -Risk Aware Mitigation for MANET Routing Attacks
A Study on -Risk Aware Mitigation for MANET Routing AttacksIRJET Journal
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetIOSR Journals
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd Iaetsd
 
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...IJMER
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONijscai
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
 

Similar to An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs (20)

A Study on -Risk Aware Mitigation for MANET Routing Attacks
A Study on -Risk Aware Mitigation for MANET Routing AttacksA Study on -Risk Aware Mitigation for MANET Routing Attacks
A Study on -Risk Aware Mitigation for MANET Routing Attacks
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
 
K1803036872
K1803036872K1803036872
K1803036872
 
Fv3510271037
Fv3510271037Fv3510271037
Fv3510271037
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
 
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 
C010631015
C010631015C010631015
C010631015
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTION
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2577-2580 ISSN: 2249-6645 www.ijmer.com 2577 | Page Shaik Silarbi1 , G. Sridevi2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India 2 Assoc. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India Abstract: Mobile Ad Hoc Networks (MANET) are a distributed and self configuring wireless networks. MANETs does not have a predefined network infrastructure. Application of MANET is benefited in areas such as disaster relief, military services and mine site operations. Each node communicates with the other acting nodes as routers. The co-operation and trust between the nodes are depended for the proper functioning of MANET. Being the flexible network, MANET is exposed to various types of attacks especially the routing attacks. There are various methods introduced to mitigate such critical routing attacks. In this paper, we propose a risk-aware response mechanism to systematically cope with the routing attacks in MANET, proposing an adaptive time-wise isolation method. Our risk-aware approach is based on the extended Dempster- Shafer (D-S) evidence model. D-S theory has been adopted as a valuable tool for evaluating the reliability and security in information systems and by other engineering fields, where precise measurement is impossible to obtain or expert elicitation is required. Keywords: D- S theory, MANET, Routing attack. I. INTRODUCTION Mobile Ad Hoc Networks (MANET)[1] (Figure 1) is distributed and self configuring wireless network. MANETs does not have a predefined network infrastructure. Application of MANET is benefited in areas such as disaster relief, military services and mine site operations. Each node communicates with the other nodes acting as routers. The co-operation and trust between the nodes are depended for the proper functioning of MANET. Since the network topology in MANET changes unpredictably and rapidly it is highly vulnerable to various types of attacks. Attack prevention methods such as authentication and encryption, intrusion detection system, intrusion prevention can be used in defense for reducing certain attack possibilities. MANET is considered one of the most promising fields in both research and development of wireless networks. There exist many intrusion response mechanisms for the routing attacks. The existing techniques usually attempt to isolate the vulnerable nodes from the topology there by causing the partition of network topology. Methods such as binary responses may result in the unexpected network partition, thereby causing additional damages to the network infrastructure, and naive fuzzy responses could lead to uncertainty in countering routing attacks in MANET. Several intrusion detection techniques have been introduced for detecting the vulnerable nodes and preventing the neighbor nodes compromised by the malicious nodes. Even though several mechanisms and routing protocols are introduced each of them has one or more vulnerabilities. Research on the MANETs and implementation has become a huge amount of task to be done. When a malicious node is being identified then the node has to be either repaired or another route has to be established. In most of the existing techniques the nodes when found slightly malicious is completely isolated from the entire network which will make splitting of the network and thereby causing communication problems between the nodes. Figure 1: An Example MANET II. RELATED WORK In [2], the authors propose the ariadne protocol for preventing the attacks against the networks. An ad hoc network is a group of wireless mobile computers or nodes, in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing problem in a non-adversarial setting, thereby assuming a trusted environment. Here routing attacks are An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2577-2580 ISSN: 2249-6645 www.ijmer.com 2578 | Page presented against routing in ad hoc networks, and the design and performance evaluation of a new secure on-demand ad hoc network routing protocol is presented i.e. called Ariadne. Ariadne [2] prevents compromised nodes or attackers from tampering with uncompromised routes consisting of uncompromised nodes, and also prevents a large number of types of Denial-of-Service (DOS) attacks. In [3], the authors has presented the Secure Efficient Ad hoc Distance vector routing protocol (SEAD) mechanism to guard against the DoS attacks. An ad hoc network is a collection of wireless computers or nodes, communicating among themselves over possibly multi- hop paths, without the help of any infrastructure such as base stations or access points. In [4], the authors proposed a vector model for all security services rely to a great extent on some notion of trust. However, even today, there is no accepted technique or formalism for the specification of trust and for reasoning about trust. In [5], the authors developed an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. In [6], the authors has proposed the cooperative enforcement approach. Ad hoc networks rely on the co- operation of the nodes [6] participating in the network to forward packets for each other. A node may decide not to co- operate to save all its resources while still using the network to relay its traffic. If too many nodes exhibit this behaviour, the network performance degrades and cooperating nodes may find themselves unfairly loaded. If a node observes another node that not participating correctly, it reports this observation to other nodes who then take action to avoid being affected and potentially punish the bad node by refusing to forward its traffic. III. PROPOSED WORK A. Risk- aware Response Mechanism In this section, we have a tendency to articulate an adjustive risk-aware response method supported quantitative risk estimation and risk tolerance. Rather than applying easy binary isolation of the malicious nodes, our approach adopts an isolation mechanism in a very temporal manner supported the danger price. We have a tendency to tend to perform risk assessment with the extended D-S proof theory introduced in for every routing attacks and corresponding countermeasures to make extra correct response picks illustrated in Figure 2. Figure 2: Risk-aware response mechanism Evident Collection: In this step Intrusion Detection System (IDS) provides associate degree attack alert with a confidence price, and so the routing Table modification Detector (RTCD) runs to work out what percentage changes on routing table area unit caused by the attack. Risk Evaluation: Alert confidence from IDS and therefore the routing table would be an additional thought-about as freelance evidences for risk calculation and combined with the extended D-S theory. Risk of countermeasures is calculated moreover throughout the risk assessment section, supported the danger of routing attacks and thus the chance of countermeasures, the whole risk of associate attack is also discovered. Decision Creating: The accommodative decision module provides a flexible response decision making method, that takes risk estimation and risk tolerance into consideration, to control the temporary isolation level, a user can set fully totally different thresholds to satisfy her goal. Intrusion Response: With the output from the risk assessment and decision-making module, the corresponding response actions, at the side of the routing table recovery and node isolation, administered to mitigate attack damages throughout a distributed manner. B. Response to Routing attacks In this approach, we use two different responses to deal with different attack methods: routing table recovery and the node isolation. Routing table recovery includes the local routing table recovery and global routing recovery. Local routing recovery is performed by the victim nodes that detect the attack and automatically recover its own routing table. Node isolation may be the most intuitive way to prevent further routing attacks from being launched by malicious nodes in MANET. To perform a node isolation response, the neighbors of the malicious nodes ignore the malicious node by neither forwarding packets through it nor accepting any network packets from it. Figure 3 shows an example scenario where nodes 2 to 0 are supposed to go through Nodes 3 and 5. Suppose a malicious node 1 advertises a fake link to node 0 and then it
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2577-2580 ISSN: 2249-6645 www.ijmer.com 2579 | Page would also cause all other nodes to update its routing table accordingly. As a result the data from Nodes 2 to 0 travels Node 1 rather than nodes 2 and 4 and Node 1 can manipulate and drop the traffic between Nodes 2 to 0. Figure 3: Example scenario C. Risk Assessment In risk assessment step, alert confidence from IDS and RTDC would be considered as different evidences and these two evidences combined using Dempster’s rule of combination with the importance factors (DRCIF) algorithm. It provides entire risk of attack. Security state of the MANET can be classified into two categories. {Secure, Insecure} which means security state of MANET could be either secure or insecure. Risk of MANET could be represent by belief function called Bel{Insecure}. The algorithm for combination of the multiple evidences is constructed as follows: Algorithm MUL-EDS-CMB INPUT: Evidence pool Ep OUTPUT: One evidence 1 |Ep|= sizeof(Ep); 2 While |Ep| > 1 do 3 Pick two evidences with the least IF in Ep, named E1 and E2; 4 Combine these two evidences,E= <m1  m2, (IF1+ IF2)/2>; 5 Remove E1 and E2 from Ep; 6 Add E to Ep; 7 end 8 return the evidence in Ep D. Adaptive Decision Making ADM (Adaptive Decision Making) technique is used to provide a flexible response decision making method when it gets attack alert. Our adaptive decision making module is based on the quantitative risk estimation and risk tolerance, which is shown in Figure 4. The response level is additionally splitted into multiple bands. Each band is associated with an isolation degree, which presents a different time interval of the isolation action. The response action and the band boundaries are all determined in accordance with risk tolerance and can be changed when risk tolerance threshold changes. The upper risk tolerance threshold (UT) would be associated with the permanent isolation response. The lower risk tolerance threshold (LT) will remain each node intact. The band between the upper tolerance threshold and lower tolerance threshold is associated with a temporary isolation response, in which the isolation time “T” changes dynamically based on the different response level given by and where “n” is the number of bands and i is the corresponding isolation band.
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2577-2580 ISSN: 2249-6645 www.ijmer.com 2580 | Page Figure 4: Adaptive decision making IV. CONCLUSIONS Mobile ad hoc network (MANET) is a collection of mobile nodes without the required intervention of any existing infrastructure or centralized access point such as a base station. MANET has the dynamic infrastructure hence it is highly vulnerable to various attacks. Several attacks are possible in MANET networks and among them the routing attack could cause the worst damage. There are several solutions available for mitigating such routing attacks. In this paper, we propose an adaptive risk-aware response mechanism with the extended D-S evidence model, considering damages caused by both attacks and their countermeasures. The adaptiveness of our method allows us to systematically cope with MANET routing attacks. REFERENCES [1] S. Wang, C. Tseng, K. Levitt, and M. Bishop, ―Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks,‖ Proc. 10th Int’l Symp. Recent Advances in Intrusion Detection (RAIDf’07), pp. 127- 145, 2007. [2] Hu, Y.C., Perrig, A. and Johnson, D.B. (2002), “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Proceedings of 8th Annual International Conference on Mobile Computing and Networking (MobiCom’02), ACM Press, pp.12– 23. [3] Hu, Y.C., Perrig, A. and Johnson, D.B. (2002), “Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks,” 4th IEEE Workshop Mobile Computing Systems and Applications (WMCSA’02), pp.3-13. [4] Ray and Chakraborty, S. (2004). “A vector model of trust for developing trustworthy systems,” European Symposium on Research in Computer Security, September, pp. 260–275. [5] L. Sun, R. Srivastava, and T. Mock (2006), “An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions,” J. Management Information Systems, vol. 22, no. 4, pp. 109-142. [6] Bansal, S. and Baker (2003), “Observation-Based Cooperation Enforcement in Ad Hoc Networks,” Technical Report cs.NI/0307012, Stanford University, Vol.1, No.2, pp.1-10.