2012
DOI: 10.1109/tdsc.2011.51
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Aware Mitigation for MANET Routing Attacks

Abstract: Abstract-Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naïve fuzzy response decisions. However, binary responses may resu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(18 citation statements)
references
References 29 publications
0
18
0
Order By: Relevance
“…In this section, an adaptive risk-aware response mechanism [1] as represented in figure 1, is explained that implements adaptive response actions based on quantitative risk estimation and risk tolerance values. Instead of applying simple binary isolation of malicious nodes, this approach adopts an isolation mechanism in a temporal manner based on the risk value.…”
Section: Risk Aware Response Mechanismmentioning
confidence: 99%
“…In this section, an adaptive risk-aware response mechanism [1] as represented in figure 1, is explained that implements adaptive response actions based on quantitative risk estimation and risk tolerance values. Instead of applying simple binary isolation of malicious nodes, this approach adopts an isolation mechanism in a temporal manner based on the risk value.…”
Section: Risk Aware Response Mechanismmentioning
confidence: 99%
“…A discussion on security attacks and techniques applicable to MANETs is presented in [5]. A risk aware response mechanism to systematically cope with routing attacks is proposed in [60]. In [46] the authors present an authentication, authorization and security assessment strategy in which, once a device enters a MANET, it is immediately taken out if considered dangerous by the infrastructure.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…In [46] the authors present an authentication, authorization and security assessment strategy in which, once a device enters a MANET, it is immediately taken out if considered dangerous by the infrastructure. None of the aforementioned approaches can be applied to our context since the DoS attack we are considering here (advertisement flood) does not fall in the class of attacks studied in [5,46,60].…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…Because of the dynamic nature and infrastructure-less property of the MANET [74] [75] surroundings, there exist numerous limitations as mobile devices and nodes could transfer liberally in MANET [76] [77] namely, vulnerabilities of impersonation, modification of sensitive e-commerce dealings, eavesdrop of communications channels, DoS, etc. by malevolent insiders [78] [79] [80]. With the enhancement of wireless networks, a user can access the data collected by sensors at in all places, and authentication is a significant concern in the network security [81] [82] [83].…”
Section: Introductionmentioning
confidence: 99%