Mitigating Routing Attacks in Mobile Ad Hoc Networks
Keywords:Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector
Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the identified routing attacks. To avoid the routing attacks Dijkstra’s and Destination sequenced Distance Vector algorithm are used. Dijkstra's algorithm solves the single-source shortest-path problem when all edges have non-negative weights. The primary improvement for ad hoc networks made in DSDV over conventional distance vector is the addition of a sequence number in each routing table entry.
Index Terms - Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector.
Uzma Shaikh , Arokia Paul Rajan , Intrusion detection and avoidance of black and grey hole attacks using AODV protocol based MANET , International Journal of Engineering & Technology, 7 (1.2) (2018) 110-116 .
Y. Sun, W. Yu, Z. Han, and K. Liu, “Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.
Hui Wang and Sally McClean, “Deriving Evidence Theoretical Functions in Multivariate Data Spaces : A Systematic Approach,” IEEE Transactions on Systems, vol. 38, No. 2, APRIL 2008.
Viswa Jhananie K.R , An Efficient Algorithm for Detecting and Removing Black hole Attack for Secure Routing in Mobile Ad-hoc Network , International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 5 (2016) .
Mojtaba GhanaatPisheh Sanaei , Imran Ghani , Aida Hakemi , Seung Ryul Jeong , Routing Attacks in Mobile ad hoc Networks : an overview , 123Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru 81300, Malaysia 45School of Business Information Technology, Kookmin University, Korea . Sci.Int.(Lahore),25(4),1031-1034,2013 ISSN 1013-5316; CODEN: SINTE 8 1031
Khaleel Ur Rahman, A Venu Gopal Reddy and Rafi U Zamen, “An Efficient Destination Sequenced Distance Vector Routing Protocol for Mobile Ad Hoc Networks,” International Conference on Computer Science 2008.
Sagar R Deshmukh , P N Chatur , Nikhil B Bhople , AODV-Based Secure Routing Against Blackhole Attack in MANET, IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India .
B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “ A Survey of Routing Attacks in Mobile Ad Hoc Networks,”IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85- 91,Oct 2007.
S. S. Jadhav, A. V. Kulkarni , R. Menon, "Mobile Ad-Hoc Network (MANET) for disaster management," 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), Vijayawada, 2014, pp. 1-5.
How to Cite
Copyright (c) 2019 Ahmed Elkabour, Rahma Teirab Abaker Haroun
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.