15 ijaems may 2015 16 a novel approach to reduce active attacks in manet using extendeddempster shaf

Page 1

International Journal of Advanced Engineering, Management and Science (IJAEMS)

[Vol-1, Issue-2, May- 2015] ISSN: 2454-1311

A Novel Approach to Reduce Active Attacks in MANET Using Extended Dempster Shafer Theory Prof. H. Santhi1, Prof. Gayathri. P2, Dr. N. Jaisankar3 1,2

Assistant Professor (Senior), School of Computing Science and Engineering, VIT University, Vellore , Tamil Nadu, India, 3 Professor, School of Computing Science and Engineering, VIT University, Vellore , Tamil Nadu, India

Abstract—MANET is kind of adhoc network which changes location and organize itself. This kind of networks doesn’t have any fixed framework and are more tending to attacks that take place in the networks. Encompassed by theseattacks routing attacks had received significant interest since it could the most overwhelming damage to MANET. The present methodologies like 2ACK, NACK, SMP and STP results the inadequacy of detecting attackers trespass during collisions and have high routing overhead. To overcome this we areusing reactive routing protocols like DSR in MANET we used extended Dempster Shafer theory to identify routing attacks in the network. Keywords— Mobile Adhoc Network, Extended Dempster Shafer theory, intrusion detection, intrusion response

A MANET is self-governing system of linked by wireless networks. Here the routers move arbitrarily and arrange themselves erratically. So, the wireless network topology will change immediately and impulsively. Such a network may progressin a standalone style. Mob

Comp uter

Mob

Mob Compute

Mob

I. INTRODUCTION Mobile Adhoc networks are set a wireless communication in improvised surroundings without a predefined framework. MANET is deployed in unfavorable aggressive environments where central authority point is not compulsory. The unique characteristic of MANET is the dynamic nature of its network topology which is repeatedly changed due to volatile mobility of MANET. Each mobile node in MANET acts as a router during a data transmission in the network. Therefore any compromise nodes under an unfriendly control could cause major damage to the process and security of its network the crash would transmit in performing routing tasks. Several works addressed in the intrusion response actions in MANET by separating perverse nodes based on the node reputation resultantfrom the actions. A simple reply against malignant node often neglects possible negative side effect involved with the reply actions. In MANET improper countermeasures may cause the sudden network division that causes damage to the network framework.

Fig 1 Manet Routing II.

ATTACK IN MANET

In all the layers of the network there occurs somedissimilar type attack in MANET. There are two types of attack in network. Active attack and Passive attack are more important here we are going discuss about active attack. 2.1Sleep Deprivation AttackThiskind of attack is more specific to mobile attacks. The saying is to sap-off limited assets in the mobile adhoc by assiduously makes them busy giving out avoidable packets. In these routing protocols like DSR, sleep deprivation attack might be launch by flood the directed node with avoidable routing packets. As an outcome that exacting node is not capable to contribute in the routing and affected by the other nodes in the network. 2.2 Link Spoofing AttackA link spoofing attack the traducer node announces affected links with non-neighbors to disturb Page | 104


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.