Mitigating Routing Attacks in Mobile Ad Hoc Networks

Authors

  • Ahmed Elkabour Sudan Technical University, Sudan
  • Rahma Teirab Abaker Haroun University College in Alkhafji, University of Hafr Al Batin, Saudi Arabia

DOI:

https://doi.org/10.31686/ijier.vol7.iss7.1603

Keywords:

Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector

Abstract

Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the identified routing attacks. To avoid the routing attacks Dijkstra’s and Destination sequenced Distance Vector algorithm are used. Dijkstra's algorithm solves the single-source shortest-path problem when all edges have non-negative weights. The primary improvement for ad hoc networks made in DSDV over conventional distance vector is the addition of a sequence number in each routing table entry.

Index Terms - Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector.

Downloads

Download data is not yet available.

Author Biographies

Ahmed Elkabour, Sudan Technical University, Sudan

Department of ET, Nyala Technical College

Rahma Teirab Abaker Haroun, University College in Alkhafji, University of Hafr Al Batin, Saudi Arabia

Dept. of Math

References

Uzma Shaikh , Arokia Paul Rajan , Intrusion detection and avoidance of black and grey hole attacks using AODV protocol based MANET , International Journal of Engineering & Technology, 7 (1.2) (2018) 110-116 .

Y. Sun, W. Yu, Z. Han, and K. Liu, “Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.

Hui Wang and Sally McClean, “Deriving Evidence Theoretical Functions in Multivariate Data Spaces : A Systematic Approach,” IEEE Transactions on Systems, vol. 38, No. 2, APRIL 2008.

Viswa Jhananie K.R , An Efficient Algorithm for Detecting and Removing Black hole Attack for Secure Routing in Mobile Ad-hoc Network , International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 5 (2016) .

Mojtaba GhanaatPisheh Sanaei , Imran Ghani , Aida Hakemi , Seung Ryul Jeong , Routing Attacks in Mobile ad hoc Networks : an overview , 123Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru 81300, Malaysia 45School of Business Information Technology, Kookmin University, Korea . Sci.Int.(Lahore),25(4),1031-1034,2013 ISSN 1013-5316; CODEN: SINTE 8 1031

Khaleel Ur Rahman, A Venu Gopal Reddy and Rafi U Zamen, “An Efficient Destination Sequenced Distance Vector Routing Protocol for Mobile Ad Hoc Networks,” International Conference on Computer Science 2008.

Sagar R Deshmukh , P N Chatur , Nikhil B Bhople , AODV-Based Secure Routing Against Blackhole Attack in MANET, IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India .

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “ A Survey of Routing Attacks in Mobile Ad Hoc Networks,”IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85- 91,Oct 2007.

S. S. Jadhav, A. V. Kulkarni , R. Menon, "Mobile Ad-Hoc Network (MANET) for disaster management," 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), Vijayawada, 2014, pp. 1-5.

Downloads

Published

31-07-2019

How to Cite

Elkabour, A., & Haroun, R. T. A. . (2019). Mitigating Routing Attacks in Mobile Ad Hoc Networks. International Journal for Innovation Education and Research, 7(7), 227–233. https://doi.org/10.31686/ijier.vol7.iss7.1603