Botho University Repository

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

Show simple item record

dc.contributor.author Ranjan, Abhiskek,
dc.contributor.author Venu Madhav, Kuthadi
dc.contributor.author Rajalakshmi, Selvaraj
dc.contributor.author Tshilidzi, Marwala
dc.date.accessioned 2014-02-24T16:37:02Z
dc.date.accessioned 2020-10-28T07:06:54Z
dc.date.available 2014-02-24T16:37:02Z
dc.date.available 2020-10-28T07:06:54Z
dc.date.issued 2013-11-27
dc.identifier.citation Ranjan, Abhiskek, Venu Madhav Kuthadi, Rajalakshmi Selvaraj, and Tshilidzi Marwala. "Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node." in International Conference on Information Technology and Computer Systems Engineering (ITCSE'2013) Johannesburg (South Africa) Nov. 27-28, 2013 en_US
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/47
dc.description.abstract The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert message to each mobile node in the network, when the attacker attacks the network. Then, Routing table change Detector identifies exactly how many changes has occurred in each node after receiving the alert messages from the intrusion detection system and also it make some changes in the routing table of each node in the network. From these changes, the Intrusion detection system identifies the attackers and these attackers are isolated from the network. The main drawback of this existing system is whenever the attacker is occurred, the Intrusion detection system has to send an alert message every time and the routing table change detector has to make some changes in the routing table. In order to avoid these drawbacks, the knowledge based intelligent system is proposed. In this proposed system, initially a source node has to get an authorized path from the intelligent node (a node with high energy) to send a data to the destination node. This proposed system discussed with the four routing attacks such as route salvage, sleep deprivation, colluding miss relay and collision attack. en_US
dc.description.sponsorship Botho University en_US
dc.language.iso en en_US
dc.subject Dempster-shafer theory en_US
dc.subject Attacker en_US
dc.subject Route salvage en_US
dc.subject Sleep deprivation en_US
dc.subject Colluding en_US
dc.title Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BU Repository


Advanced Search

Browse

My Account