Detection and avoidance of routing attack in mobile ad-hoc network using intelligent node
Journal article
Authors/Editors
Research Areas
Publication Details
Subtitle: Detection and avoidance of routing attack in mobile ad-hoc network using intelligent node
Author list: Selvaraj, Rajalakshmi
Publisher: Wiley: 24 months
Publication year: 2013
Journal: Global Networks: A Journal of Transnational Affairs (1470-2266)
Start page: 1
End page: 7
Number of pages: 7
ISSN: 1470-2266
eISSN: 1471-0374
URL: file:///C:/Users/kethmoloi/Downloads/PDF Document (2).pdf
Languages: English-United States (EN-US)
Abstract
the routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert message to each mobile node in the network, when the attacker attacks the network. Then, Routing table change Detector identifies exactly how many changes has occurred in each node after receiving the alert messages from the intrusion detection system and also it make some changes in the routing table of each node in the network. From these changes, the Intrusion detection system identifies the attackers and these attackers are isolated from the network. The main drawback of this existing system is whenever the attacker is occurred, the Intrusion detection system has to send an alert message every time and the routing table change detector has to make some changes in the routing table. In order to avoid these drawbacks, the knowledge based intelligent system is proposed. In this proposed system, initially a source node has to get an authorized path from the intelligent node (a node with high energy) to send a data to the destination node. This proposed system discussed with the four routing attacks such as route salvage, sleep deprivation, colluding miss relay and collision attack
Keywords
Dempster-shafer theory, attacker, route salvage, sleep deprivation, colluding.
Documents
No matching items found.