Risk-Aware Mitigation for MANET Routing Attacks
#1

Abstract—Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naïve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naïve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.



projects9.com
Contact us : projects[at]projects9.com
Call us :8008855666
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mitigation of node capture attacks, implementation of risk aware mitigation fo manet routing attacks, full documentation of risk aware mitigation, risk aware mitigation for manet routing attacks, srs for risk aware mitigation, literature survey on risk aware mitigation for routing attack in manet, risk aware mitigation for manet routing attacks system architecture,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,548 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Energy-Aware Autonomic Resource Allocation in Multi tier Virtualized Environments 1 740 14-02-2017, 02:13 PM
Last Post: jaseela123d
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 665 14-02-2017, 11:35 AM
Last Post: ijasti
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,953 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,681 27-01-2015, 12:09 AM
Last Post: Guest
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,537 10-01-2015, 11:13 PM
Last Post: Guest
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,347 30-07-2013, 05:30 PM
Last Post: mounikabujji
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,906 18-03-2013, 12:25 PM
Last Post: computer topic
  distributed cache updating for the dynamic source routing protocol project report tiger 4 3,000 05-03-2013, 02:22 PM
Last Post: Guest
  Conditional Shortest Path Routing in Delay Tolerant Networks seminar class 5 3,627 18-01-2013, 03:06 PM
Last Post: Guest

Forum Jump: