An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 4
Abstract
Mobile Ad Hoc Networks (MANET) are a distributed and self configuring wireless networks. MANETs does not have a predefined network infrastructure. Application of MANET is benefited in areas such as disaster relief, military services and mine site operations. Each node communicates with the other acting nodes as routers. The co-operation and trust between the nodes are depended for the proper functioning of MANET. Being the flexible network, MANET is exposed to various types of attacks especially the routing attacks. There are various methods introduced to mitigate such critical routing attacks. In this paper, we propose a risk-aware response mechanism to systematically cope with the routing attacks in MANET, proposing an adaptive time-wise isolation method. Our risk-aware approach is based on the extended DempsterShafer (D-S) evidence model. D-S theory has been adopted as a valuable tool for evaluating the reliability and security in information systems and by other engineering fields, where precise measurement is impossible to obtain or expert elicitation is required.
Authors and Affiliations
Shaik Silarbi
Integral solution of the non-homogeneous heptic equation in terms of the generalised Fibonacci and Lucas sequences
Abstract: We obtain infinitely many non-zero integer sextuples ( , , , , , ) x y z w p T satisfying the Non-homogeneous equation of degree seven with six unknowns given by 5 5 3 3 2 2 2 2 3 x y x y xy z w p T...
OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in Acid Medium
[u][/u] The corrosion inhibitive action of oxystelma esculentum stem on mild steel corrosion in 0.5 M H2SO4 solution was studied using weight loss method, potentiodynamic polarization and EIS measurements. The resul...
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh Networks
Multi-hop routing in wireless sensor networks (WSNs) offer small protection against trickery throughout replaying routing information. A challenger can develop this defect to launch various harmful or even devastat...
Hiding Data Transmission with High Security in Cloud Computing with Cloud Server
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data has to be encrypted before outsourced to the commercial public cloud, which makes effe...
Analysis of Emergence of Cities
Emergence is the creation of systems of greater dimension than the elements that create it. Emergence is a phenomenon which is intrinsic to the way systems grow and evolve. Since the dawn of civilization, humans have mad...