Open Access Open Access  Restricted Access Subscription or Fee Access

Risk Conscious Easing of Routing Attacks for Ad-hoc Networks

C. Dhanasekaran, Dr. R.S. Ponmagal

Abstract


Ad hoc networks are wireless dynamic networks that possess self configuration character which leads to high vulnerable threats to networks. Earlier the malicious nodes that cause the threats are completely removed from the network, which may cause the network partition and diversion. In the proposed work, the isolation technique is used to maintain the network stability to protect the network infrastructure.

Keywords


Dynamic, Self-Configuration, Malicious, Isolation, Network Infrastructure.

Full Text:

PDF

References


F. Anjum and R. Talpade. Lipad: lightweight packet drop detection for ad hoc networks. In 2004 IEEE 60th Vehicular technology Conference, 2004. VTC2004-Fall, pages 1233–1237, 2004.

O. Basir and X. Yuan. Engine fault diagnosis based on multi-sensor information fusion using Dempster–Shafer evidence theory. Information Fusion, 8(4):379–386, 2007.

P. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, and A. Reninger. Fuzzy MLS: An Experiment on Quantified Risk-Adaptive Access Control. In IEEE Symposium on Security and Privacy, volume 2007. Citeseer, 2007.

E.M. Royer, C-K. Toh, . A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks. IEEE Personal Communications Magazine. April 1999.

C. Perkins, E. Belding-Royer, and S. Das. RFC3561: Ad hoc on-demand distance vector (AODV) routing, 2003.

Y. Hu, D. Johnson, and A. Perrig. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1):175–192, 2003.

Y. Hu and A. Perrig. A survey of secure wireless ad hoc routing. IEEE Security and Privacy magazine, 2:28–39, 2004.

Y. Hu, A. Perrig, and D. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks, 11(1):21–38, 2005.

B. Kannhavong, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto. A study of a routing attack in OLSR-based mobile ad hoc networks. International Journal of Communication Systems, 20(11):1245–1261,2007.

B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour. A collusion attack against olsr-based mobile ad hoc networks. In GLOBECOM, 2006.

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour. A Survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, page 86, 2007.

J. Liu and V. Issarny. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. LECTURE NOTES IN COMPUTER SCIENCE, pages 48–62, 2004.

T. View. Information theoretic framework of trust modeling and evaluation for ad hoc networks. Selected Areas in communications, IEEE Journal on, 24(2):305–317, 2006.

S. Wang, C. Tseng, K. Levitt, and M. Bishop. Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. LECTURE NOTES IN COMPUTER SCIENCE, 4637:127, 2007.

Zakhary, S.R., Radenkovic, M. Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments. Wireless On-demand Network Systems and Services (WONS). 161 - 167. 2010.

Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu. Risk-Aware Response for Mitigating MANET Routing Attacks. Ieee Transactions On Dependable And Secure Computing, Vol. 9, No. 2, March/April 2012


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.