25.01.2014 Views

download - Ijsrp.org

download - Ijsrp.org

download - Ijsrp.org

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013 791<br />

ISSN 2250-3153<br />

behavior of node.<br />

considered here.<br />

Efficient symmetric cryptographic<br />

method with Ariadne which is a<br />

secure on demand routing protocol<br />

No trusted environment needed<br />

Routing protocol used here is less<br />

efficient than the optimized version<br />

of DSR<br />

Dynamic learning method<br />

AODV routing protocol<br />

with<br />

Training data can be updated<br />

according to the changing network<br />

environment<br />

Updating training set is a tedious<br />

process.<br />

Adaptive Probing technique with On<br />

demand secure Byzantine routing<br />

protocol.<br />

Route discovery is Based on the<br />

aggregate signature.<br />

Does not provide effective solution<br />

to the attacks other than the<br />

Byzantine attacks.<br />

Dempster – Shafer Theory<br />

Valuable tool for the evaluation of<br />

risk in engineering applications<br />

when it is not possible to obtain a<br />

precise measurement from<br />

experiments.<br />

It does not support the non<br />

associative and weighted<br />

combination of rule which is<br />

required in most of the cases.<br />

IV. CONCLUSION<br />

Risk mitigating technique is one of the major issues in Mobile<br />

Ad Hoc environment. This paper surveyed the various existing<br />

Risk Mitigating techniques in MANET environment and<br />

compares their various parameters. Earlier Risk Mitigating<br />

technique does not consider the Risk because of countermeasure.<br />

Therefore there is a need to implement a new Risk Mitigating<br />

technique that can consider both the Risk because of attacks and<br />

Risk because of countermeasure in MANET environment.<br />

[9] Marti.S, Giuli.T, Lai.K, and Baker.M (2000), “Mitigating Routing<br />

Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom, pp. 255-<br />

265.<br />

[10] Praveen Joshi(2010),” Security issues in routing protocols in MANETs at<br />

network layer”, WCIT.<br />

REFERENCES<br />

[1] Hu.Y, Perrig.A, and Johnson.D(2004), “Packet Leashes: A Defense<br />

against Wormhole Attacks in Wireless Networks,” Proc. IEEE<br />

INFOCOM, vol. 3, pp. 1976-1986.<br />

[2] Radwan.A , Mahmoud.T , Houssein.E,” Evaluation comparison of some ad<br />

hoc networks routing protocols”.<br />

[3] Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah,” A Survey on<br />

MANET Intrusion Detection”.<br />

[4] Hu.Y, Perrig.A, and Johnson.D(2005), “Ariadne: A Secure On-Demand<br />

Routing Protocol for Ad Hoc Networks,” Wireless Networks, vol. 11, no. 1,<br />

pp. 21-38.<br />

[5] Kurosawa.S, Nakayama.H, Kato.N, and Jamalipour.A (2006),<br />

“Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by<br />

Dynamic Learning Method,” Int’l J. Network Security, vol. 105, no. 627,<br />

pp. 65-68.<br />

[6] Awerbuch.B, Curtmola.R, Holmer.D, C. Nita-Rotaru, and Rubens.H(2008),<br />

“ODSBR An On-Demand Secure Byzantine Resilient Routing<br />

Protocol for Wireless Ad Hoc Networks,” ACM Trans. Information and<br />

System Security, vol. 10, no. 4, pp. 1-35.<br />

[7] Karlof.C and Wagner.D(2003), “Secure Routing in Wireless Sensor<br />

Networks: Attacks and Countermeasures,” Ad Hoc Networks, vol. 1, nos.<br />

2/3, pp. 293-315.<br />

[8] Mohammed.N, Otrok.H, Wang.L, Debbabi.M, and Bhattacharya (2011,<br />

Jan./Feb), “Mechanism Design-Based Secure Leader Election Model for<br />

Intrusion Detection in MANET,” IEEE Trans. Dependable and Secure<br />

Computing, vol. 8, no. 1, pp. 89-103.<br />

www.ijsrp.<strong>org</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!