32 Citations (Scopus)

Abstract

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or nave fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and nave fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.

Original languageEnglish (US)
Article number6035723
Pages (from-to)250-260
Number of pages11
JournalIEEE Transactions on Dependable and Secure Computing
Volume9
Issue number2
DOIs
StatePublished - 2012

Fingerprint

Network routing
Mobile ad hoc networks
Experiments

Keywords

  • dempster-shafer theory
  • intrusion response
  • Mobile ad hoc networks
  • risk aware

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Risk-aware mitigation for MANET routing attacks. / Zhao, Ziming; Hu, Hongxin; Ahn, Gail-Joon; Wu, Ruoyu.

In: IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 2, 6035723, 2012, p. 250-260.

Research output: Contribution to journalArticle

Zhao, Ziming ; Hu, Hongxin ; Ahn, Gail-Joon ; Wu, Ruoyu. / Risk-aware mitigation for MANET routing attacks. In: IEEE Transactions on Dependable and Secure Computing. 2012 ; Vol. 9, No. 2. pp. 250-260.
@article{050503ad90f14274b9929f549a064da8,
title = "Risk-aware mitigation for MANET routing attacks",
abstract = "Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or nave fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and nave fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.",
keywords = "dempster-shafer theory, intrusion response, Mobile ad hoc networks, risk aware",
author = "Ziming Zhao and Hongxin Hu and Gail-Joon Ahn and Ruoyu Wu",
year = "2012",
doi = "10.1109/TDSC.2011.51",
language = "English (US)",
volume = "9",
pages = "250--260",
journal = "IEEE Transactions on Dependable and Secure Computing",
issn = "1545-5971",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

TY - JOUR

T1 - Risk-aware mitigation for MANET routing attacks

AU - Zhao, Ziming

AU - Hu, Hongxin

AU - Ahn, Gail-Joon

AU - Wu, Ruoyu

PY - 2012

Y1 - 2012

N2 - Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or nave fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and nave fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.

AB - Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or nave fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and nave fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.

KW - dempster-shafer theory

KW - intrusion response

KW - Mobile ad hoc networks

KW - risk aware

UR - http://www.scopus.com/inward/record.url?scp=84856298337&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84856298337&partnerID=8YFLogxK

U2 - 10.1109/TDSC.2011.51

DO - 10.1109/TDSC.2011.51

M3 - Article

VL - 9

SP - 250

EP - 260

JO - IEEE Transactions on Dependable and Secure Computing

JF - IEEE Transactions on Dependable and Secure Computing

SN - 1545-5971

IS - 2

M1 - 6035723

ER -