Risk-aware mitigation for MANET routing attacks

IEEE Transactions on Dependable and Secure Computing (Impact Factor: 1.35). 05/2012; 9(2):250 - 260. DOI: 10.1109/TDSC.2011.51
Source: IEEE Xplore


Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naïve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naïve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.

Download full-text


Available from: Ziming Zhao, Jun 27, 2014
1 Follower
79 Reads
  • Source
    • "Zhao et al. [10] took Dempster-Shafer mathematical theory of evidence (D-S theory) with importance factors and belief functions and proposed extended Dempster's rule of combination with importance factors (DRCIF). Using this risk aware adaptive decision making module can be created for mitigating MANET routing attacks. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Mobile Ad-Hoc Networks (MANETS) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETS) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A lot of work is going on in the area of Intrusion detection, and response techniques to appease critical attacks. In existing system, binary isolation and DRC techniques are used to isolate the malicious nodes. However, binary isolation leads to unexpected network partitioning and DRC is associative and non-weighted. Therefore, in this paper, we present an adaptive risk-aware response mechanism using CSS-OLSR cooperative security scheme OLSR based on an extended Dempster-Shafer mathematical theory of evidence. The effectiveness of security mechanism is demonstrated by using network simulator NS2 software in which various metrics shows secured performance of the network.
    International Journal of Computer Applications 02/2015; 112(15):30-33. DOI:10.5120/19745-1560
  • Source
    • "Securing mobile [Ad hoc] networks (MANETs for short) is particularly challenging because these networks often operate in adverse or even hostile environments [1] [2]. In addition, they are characterized by the open radio-based medium of communication [3], the dynamic topology [4] [5], the lack of centralized administration/security enforcement points (e.g., switches and routers) [6], the low degree of physical security of the mobile nodes, and the limited resources (e.g., energy, bandwidth) [7]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives.
    International Journal of Distributed Sensor Networks 06/2013; 2013. DOI:10.1155/2013/521497 · 0.67 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: A selective forwarding attack is a notorious security problem in MANET environments. The attacking method can seriously cause a failure in MANET transmission. So, several previous schemes have proposed to solve the problem. However, all of the previous schemes still have some drawbacks. Hence, in this paper, we have designed a new challenge and response scheme to detect the selective forwarding attack. The prototype of our design has also been implemented on CORE emulator, and been experimented on. The experimental results have demonstrated that our new scheme can effectively identify the selective forwarding attacker.
    Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on; 01/2013
Show more