An Efficient Risk-Aware Distributed Control System to Minimize Routing Attacks on MANET

Authors

  • Swati M. Dahekar Department of Computer Science and Engineering, Abha Gaikwad-patil college of Engineering, Nagpur, India
  • Yogesh Bhute Department of Computer Science and Engineering, Abha Gaikwad-patil college of Engineering, Nagpur, India

DOI:

https://doi.org/10.53555/nncse.v2i3.457

Keywords:

Mobile Ad-hoc Network, Risk aware, Multilevel-data, Routing attack, Distributed node, Attack detection, Attack Mitigation.

Abstract

The topological nature of MANET(Mobile Ad-hoc Network) itself demands high security due to its mobility movement, but designing a risk aware routing path for MANET is a complex task because of its Dynamic nature of Infrastructure. In this proposal, designing an Dynamic routing path decider to find less risk aware routing path for effective communication. The efficiency of the throughput and Routing failures can be further reduced by making Nodes of MANET to be more Knowledgeable that is with more Metadata parameters. This paper introduce a class of metrics to measure the effective security offered in a wireless network as a function of the routing topology and the link security provided by the key assignment protocol. This joint protocol analysis allows a network analyst or an adversary to evaluate the vulnerability of network traffic and isolate weakly secured connections. Its show how an intelligent adversary can mount a node capture attack using vulnerability evaluation to focus the attack on the nodes which contribute maximally to the compromise of network traffic.

References

Y. Sun, W. Yu, Z. Han, and K. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2,pp. 305-317, Feb.2006

M. Refaei, L. DaSilva, M. Eltoweissy, and T. Nadeem, “Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks,” IEEE Trans. Computers, vol. 59, no. 5,pp. 707-719, May 2010

P. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, and A.Reninger, “Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control,” Proc. 28th IEEE Symp.Security and Privacy, 2007

G. Shafer, A Mathematical Theory of Evidence. Princeton Univ., 1976

L. Sun, R. Srivastava, and T. Mock, “An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions,” J. Management Information Systems,vol. 22, no. 4, pp. 109- 142, 2006

L. Zadeh, “Review of a Mathematical Theory of Evidence,” AIMagazine, vol. 5, no. 3, p. 81, 1984

Downloads

Published

2015-03-31

How to Cite

Dahekar, S. M., & Bhute, Y. (2015). An Efficient Risk-Aware Distributed Control System to Minimize Routing Attacks on MANET. Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552), 2(3), 01-05. https://doi.org/10.53555/nncse.v2i3.457