ijier logo

Mitigating Routing Attacks in Mobile Ad Hoc Networks

Authors
  • Ahmed Elkabour

    Sudan Technical University, Sudan

    Author

  • Rahma Teirab Abaker Haroun

    University College in Alkhafji, University of Hafr Al Batin, Saudi Arabia

    Author

Keywords:
Array, Array, Array, Array, Array
Abstract

Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the identified routing attacks. To avoid the routing attacks Dijkstra’s and Destination sequenced Distance Vector algorithm are used. Dijkstra's algorithm solves the single-source shortest-path problem when all edges have non-negative weights. The primary improvement for ad hoc networks made in DSDV over conventional distance vector is the addition of a sequence number in each routing table entry.

Index Terms - Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector.

Author Biographies
  1. Ahmed Elkabour, Sudan Technical University, Sudan

    Department of ET, Nyala Technical College

  2. Rahma Teirab Abaker Haroun, University College in Alkhafji, University of Hafr Al Batin, Saudi Arabia

    Dept. of Math

References

Uzma Shaikh , Arokia Paul Rajan , Intrusion detection and avoidance of black and grey hole attacks using AODV protocol based MANET , International Journal of Engineering & Technology, 7 (1.2) (2018) 110-116 . DOI: https://doi.org/10.14419/ijet.v7i1.2.9020

Y. Sun, W. Yu, Z. Han, and K. Liu, “Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006. DOI: https://doi.org/10.1109/JSAC.2005.861389

Hui Wang and Sally McClean, “Deriving Evidence Theoretical Functions in Multivariate Data Spaces : A Systematic Approach,” IEEE Transactions on Systems, vol. 38, No. 2, APRIL 2008. DOI: https://doi.org/10.1109/TSMCB.2007.913593

Viswa Jhananie K.R , An Efficient Algorithm for Detecting and Removing Black hole Attack for Secure Routing in Mobile Ad-hoc Network , International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 5 (2016) .

Mojtaba GhanaatPisheh Sanaei , Imran Ghani , Aida Hakemi , Seung Ryul Jeong , Routing Attacks in Mobile ad hoc Networks : an overview , 123Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru 81300, Malaysia 45School of Business Information Technology, Kookmin University, Korea . Sci.Int.(Lahore),25(4),1031-1034,2013 ISSN 1013-5316; CODEN: SINTE 8 1031

Khaleel Ur Rahman, A Venu Gopal Reddy and Rafi U Zamen, “An Efficient Destination Sequenced Distance Vector Routing Protocol for Mobile Ad Hoc Networks,” International Conference on Computer Science 2008. DOI: https://doi.org/10.1109/ICCSIT.2008.122

Sagar R Deshmukh , P N Chatur , Nikhil B Bhople , AODV-Based Secure Routing Against Blackhole Attack in MANET, IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India . DOI: https://doi.org/10.1109/RTEICT.2016.7808179

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “ A Survey of Routing Attacks in Mobile Ad Hoc Networks,”IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85- 91,Oct 2007. DOI: https://doi.org/10.1109/MWC.2007.4396947

S. S. Jadhav, A. V. Kulkarni , R. Menon, "Mobile Ad-Hoc Network (MANET) for disaster management," 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), Vijayawada, 2014, pp. 1-5. DOI: https://doi.org/10.1109/WOCN.2014.6923074

Downloads
Published
2019-07-01
Section
Journal Articles
License

Copyright (c) 2019 Ahmed Elkabour, Rahma Teirab Abaker Haroun

Creative Commons License

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.

Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author for more visit Copyright & License.

How to Cite

Elkabour, A., & Haroun, R. T. A. . (2019). Mitigating Routing Attacks in Mobile Ad Hoc Networks. International Journal for Innovation Education and Research, 7(7), 227-233. https://doi.org/10.31686/ijier.vol7.iss7.1603