Results 1 -
7 of
7
unknown title
"... Abstract-the routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing at ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract-the routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert message to each mobile node in the network, when the attacker attacks the network. Then, Routing table change Detector identifies exactly how many changes has occurred in each node after receiving the alert messages from the intrusion detection system and also it make some changes in the routing table of each node in the network. From these changes, the Intrusion detection system identifies the attackers and these attackers are isolated from the network. The main drawback of this existing system is whenever the attacker is occurred, the Intrusion detection system has to send an alert message every time and the routing table change detector has to make some changes in the routing table. In order to avoid these drawbacks, the knowledge based intelligent system is proposed. In this proposed system, initially a source node has to get an authorized path from the intelligent node (a node with high energy) to send a data to the destination node. This proposed system discussed with the four routing attacks such as route salvage, sleep deprivation, colluding miss relay and collision attack.
Analysis and Implementation of Proposed Hybrid H-AODV Routing Protocol of MANETs using Detection of Malicious Nodes in the Network
, 2013
"... Abstract-A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes which can freely and dynamically self-organize and co-operative in to arbitrary and temporary network topologies. Security of AODV protocol is compromised by a particular type of attack called 'Black Hole' attac ..."
Abstract
- Add to MetaCart
Abstract-A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes which can freely and dynamically self-organize and co-operative in to arbitrary and temporary network topologies. Security of AODV protocol is compromised by a particular type of attack called 'Black Hole' attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. If there are multiple malicious nodes in a network and are co-operating with each other then it is known as "cooperative black hole attack". In this work a hybrid approach is proposed for implementing H-AODV, by preventing malicious nodes from network and improving efficiency. The proposed H-AODV protocol is simulated on ns-3 simulator and results are compared and analysed with base AODV protocol, based on important performance metrics like packet delivery fraction, end-to-end delay and throughput. It is concluded from the result that H-AODV with proposed enhancement is comparably better than AODV (under attack) for performance measures like packet delivery fraction, packet drop ratio, end to end delay and throughput. The performance of the detection is significantly improved and delay in detection and prevention is also reduced.
AP/IT,Excel engineering college,
"... Abstract — Mobile ad hoc networks (MANETs) include wireless communication and mobile nodes. High node mobility and limited wireless communication range mean that nodes have to cooperate in order to ensure networking, with the network changing to meet needs continually. Protocols ’ dynamic nature ena ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract — Mobile ad hoc networks (MANETs) include wireless communication and mobile nodes. High node mobility and limited wireless communication range mean that nodes have to cooperate in order to ensure networking, with the network changing to meet needs continually. Protocols ’ dynamic nature enables MANET operation to ensure deployment in extreme/volatile circumstances. Hence, MANETs are very popular research topics and have been used in areas like tactical operations, rescue operations and environmental monitoring. This paper proposes a method to mitigate malicious nodes forming Denial of service attacks in associativity based ad hoc network. It is divided into two phases: detection before route establishment and avoiding malicious nodes in data forwarding. Simplicity and effectively detecting malicious nodes are the main points of the proposed scheme. Keywords- ASSOCIATIVITY BASED ROUTING (ABR); Denial of service attacks (DOS). I.
A Multi-hop Advertising Discovery and Delivering Protocol for Multi Administrative Domain MANET
"... AMobile Ad-hoc NETwork (MANET) isMulti Administrative Domain (MAD) if each network node belongs to an independent authority, that is each node owns its resources and there is no central authority owning all network nodes. One of the main obstructions in designing Service Advertising, Discovery and D ..."
Abstract
- Add to MetaCart
(Show Context)
AMobile Ad-hoc NETwork (MANET) isMulti Administrative Domain (MAD) if each network node belongs to an independent authority, that is each node owns its resources and there is no central authority owning all network nodes. One of the main obstructions in designing Service Advertising, Discovery and Delivery (SADD) protocol for MAD MANETs is the fact that, in an attempt to increase their own visibility, network nodes tend to flood the network with their advertisements. In this paper, we present a SADD protocol for MAD MANET, based on Bloom filters, that effectively prevents advertising floods due to such misbehaving nodes. ∗corresponding author 1 Our results with the ns-2 simulator show that our SADD protocol is effective in counteracting advertising floods, it keeps low the collision rate as well as the energy consumption while ensuring that each peer receives all messages broadcasted by other peers.
Risk Aware Intrusion Detection and Response Mechanism for MANET
"... Mobile Ad-Hoc Networks (MANETS) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETS) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A ..."
Abstract
- Add to MetaCart
(Show Context)
Mobile Ad-Hoc Networks (MANETS) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETS) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A lot of work is going on in the area of Intrusion detection, and response techniques to appease critical attacks. In existing system, binary isolation and DRC techniques are used to isolate the malicious nodes. However, binary isolation leads to unexpected network partitioning and DRC is associative and non-weighted. Therefore, in this paper, we present an adaptive risk-aware response mechanism using CSS-OLSR cooperative security scheme OLSR based on an extended Dempster-Shafer mathematical theory of evidence. The effectiveness of security mechanism is demonstrated by using network simulator NS2 software in which various metrics shows secured performance of the network.
Mean Probabilistic Approach for Risk Estimation in
"... Abstract: Mobile ad hoc network (MANET) is a collection of mobile hosts without the required intervention of any existing infrastructure or centralized access point such as a base station. MANET has the dynamic infrastructure hence it is highly vulnerable to attacks. Several attacks are possible in ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract: Mobile ad hoc network (MANET) is a collection of mobile hosts without the required intervention of any existing infrastructure or centralized access point such as a base station. MANET has the dynamic infrastructure hence it is highly vulnerable to attacks. Several attacks are possible in MANET networks and among them routing attack could cause the worst damage. There are several solutions available for mitigating the routing attacks based on the intrusion response techniques but most of them isolate the malicious node only based on the binary decisions taken for severity in attacks. This will cause additional damage to the network. Risk mitigating techniques is one of the important factor in MANET environment. This paper is about exchange of data between the various nodes in a MANET in a secure manner. we have designed an approach for fusing the evidences so that risk can be assessed effectively and decision of whether an attacker node has to isolated or not. Since always isolation of attacker could result in more serious damages. Therefore our approach isolates only the fake links established by the attacker, unless the attacker is causing more devastating damages.
Intrusion Determent using Dempster-Shafer Theory in MANET Routing Karuturi.Satish, M-Tech Student, CSE, KITS RCPM
"... from other networks mainly by its self configuring and optimizing nature. Being the flexible network, MANET is exposed to various kinds of attacks especially the routing attacks. Attack prevention methods such as intrusion detection system, intrusion prevention, authentication and encryption can be ..."
Abstract
- Add to MetaCart
(Show Context)
from other networks mainly by its self configuring and optimizing nature. Being the flexible network, MANET is exposed to various kinds of attacks especially the routing attacks. Attack prevention methods such as intrusion detection system, intrusion prevention, authentication and encryption can be used in defense for reducing certain attack possibilities. Intrusion detection system monitors and analyses the activities of the nodes and determines the performance with the security rules. Lack of a defined central authority, securitizing the routing process becomes a challenging task in MANETS thereby leaving the network vulnerable to routing attacks, which results in deteriorated network performance thus questioning the reliability of such networks. Prior approaches to mitigate such critical attacks typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. Binary responses may result in the unexpected network partition, giving rise to new anomalies in the network infrastructure, and naïve fuzzy responses could lead to uncertainty in countering routing attacks leading to computation overhead. So we propose a risk-aware response mechanism based on an extended Dumpster-Shafer mathematical theory of evidence that introduces a notion of importance factors to systematically cope with the identified routing attacks. The effectiveness of our approach with respect to several performance metrics is highlighted n the scope of this paper. Keywords—Mobile ad hoc networks, intrusion response, risk aware, Dempster-Shafer theory. I