25-09-2012, 03:09 PM
I want system architecture and future work for this paper
25-09-2012, 03:09 PM
I want system architecture and future work for this paper
26-09-2013, 02:06 PM
Risk-Aware Mitigation for MANET Routing Attacks
Risk-Aware Mitigation.ppt (Size: 849.5 KB / Downloads: 33) INTRODUCTION In recent years the widespread availability of wireless communication and handheld devices has stimulated research on self-organizing networks that do not require a reestablished infrastructure. These ad hoc networks, as they are commonly called, consist of autonomous nodes that collaborate in order to transport information. Usually, these nodes act as end systems and routers at the same time. Ad hoc networks can be subdivided into two classes: static and mobile. In static ad hoc networks the position of a node may not change once it has become part of the network. In mobile ad hoc networks, systems may move arbitrarily. Examples where mobile ad hoc networks may be employed are the establishment of connectivity among handheld devices or between vehicles. Since mobile ad hoc networks change their topology frequently and without prior notice, routing in such networks is a challenging task. DECISION MAKING In this decision making we detect the attackers and then calculated the routing table changes and then isolated the routing table changes. Then the network dysfunction should be changed. Here the nodes routing table only changed. Nodes may not know about the attacker. And separate the trusted and non-trusted node BROADCASTING ATTACKER ALERT In this module the attacker can be detected by with the help of decision making module and then we secure the network. Then broadcast to all nodes about attackers and then band the attacker service. Broad cast to all nodes about the attacker. Then implement fuzzy rule for trusted node to forward messages. Give intrusion response to attacker. Decision making The adaptive decision module provides a flexible response decision-making mechanism, which takes risk estimation and risk tolerance into account. To adjust temporary isolation level, a user can set different thresholds to fulfill her goal. Intrusion response With the output from risk assessment and decision-making module, the corresponding response actions, including routing table recovery and node isolation, are carried out to mitigate attack damages in a distributed manner. |
|