Risk-aware mitigation for MANET routing attacks

IEEE Transactions on Dependable and Secure Computing (Impact Factor: 1.35). 05/2012; 9(2):250 - 260. DOI: 10.1109/TDSC.2011.51
Source: IEEE Xplore


Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naïve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naïve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.

Download full-text


Available from: Ziming Zhao, Jun 27, 2014
    • "Using extended Dempster-Shafer theory, Zhao and Ahn [2] freelance evidences for risk calculation and combined with the extended D-S theory. Risk of countermeasures is additionally calculated. "

    No preview · Article · Mar 2015
  • Source
    • "Zhao et al. [10] took Dempster-Shafer mathematical theory of evidence (D-S theory) with importance factors and belief functions and proposed extended Dempster's rule of combination with importance factors (DRCIF). Using this risk aware adaptive decision making module can be created for mitigating MANET routing attacks. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Mobile Ad-Hoc Networks (MANETS) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETS) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A lot of work is going on in the area of Intrusion detection, and response techniques to appease critical attacks. In existing system, binary isolation and DRC techniques are used to isolate the malicious nodes. However, binary isolation leads to unexpected network partitioning and DRC is associative and non-weighted. Therefore, in this paper, we present an adaptive risk-aware response mechanism using CSS-OLSR cooperative security scheme OLSR based on an extended Dempster-Shafer mathematical theory of evidence. The effectiveness of security mechanism is demonstrated by using network simulator NS2 software in which various metrics shows secured performance of the network.
    Full-text · Article · Feb 2015 · International Journal of Computer Applications
  • Source
    • "Securing mobile [Ad hoc] networks (MANETs for short) is particularly challenging because these networks often operate in adverse or even hostile environments [1] [2]. In addition, they are characterized by the open radio-based medium of communication [3], the dynamic topology [4] [5], the lack of centralized administration/security enforcement points (e.g., switches and routers) [6], the low degree of physical security of the mobile nodes, and the limited resources (e.g., energy, bandwidth) [7]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks that threaten ad hoc networks, focusing on the Optimized Link State Routing Protocol. We then introduce IDAR, a signature-based Intrusion Detector dedicated to ad hoc routing protocols. Contrary to existing systems that monitor the packets going through the host, our system analyses the logs so as to identify patterns of misuse. This detector scopes with the resource-constraints of ad hoc devices by providing distributed detection; in particular, depending on the level of suspicion and gravity, in-depth cooperative diagnostic may be launched. Simulation-based evaluation shows limited resource consumption (e.g., memory and bandwidth) and high detection rate along with reduced false positives.
    Full-text · Article · Jun 2013 · International Journal of Distributed Sensor Networks
Show more