Vulnerable Path Determination in mobile ad-hoc networks using Markov Model

被引:0
|
作者
Mukhopadhyay, Arunabha [1 ]
Das, Saini [2 ]
Sadhukhan, Samir [3 ]
Saha, Debashis [3 ]
机构
[1] Indian Inst Management Lucknow, Lucknow, Uttar Pradesh, India
[2] Inst Management Technol, Hyderabad, India
[3] Indian Inst Management Calcutta, Kolkata, India
来源
AMCIS 2013 PROCEEDINGS | 2013年
关键词
PISMS; vulnerable path determination module; information sensitive ad-hoc networks; Forward direction based mobility; Non-orthogonal Cartesian System; Transition probability; Markov model; ISADM; RISK-ASSESSMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security threats are of major concern in information sensitive mobile ad-hoc networks (MANETs) like emergency military communication networks. We propose a Proactive Information Security Management System (PISMS) framework with vulnerable path determination module (VPDM) for such mobile ad-hoc networks. The chief security officer can use it to identify the most vulnerable paths, so that they can be patched using suitable security technologies before the hackers actually attack and compromise them. Our PISMS computes (i) the probability of transitioning from each node to its adjacent neighbors, using two key indicators (angle and distance); (ii) number of steps required to reach a pre-determined destination from different sources using Markov model. The path that requires minimum number of steps to reach a destination is the most vulnerable path. This mechanism of identifying vulnerable path is incorporated as an integral part of the Information systems acquisition, development and maintenance (ISADM) module of ISMS framework ISO27001.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Path efficiency in mobile ad-hoc networks
    Caamano, Antonio J.
    Vinagre, Juan J.
    Mora, Inmaculada
    Figuera, Carlos
    Ramos, Javier
    2006 3RD INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, VOLS 1-2, 2006, : 223 - +
  • [2] Maximizing path durations in mobile ad-hoc networks
    Han, Yijie
    La, Richard J.
    2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 26 - 31
  • [3] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS
    Mohammadi, Hossein
    Oskoee, Ehsan Nedaaee
    Afsharchi, Mohsen
    Yazdani, Nasser
    Sahimi, Muhammad
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
  • [4] Connectivity Model for Mobile Ad-Hoc Networks
    Bruun, Rasmus Liborius
    Voulgaris, Konstantinos
    Pedersen, Troels
    2022 16TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2022,
  • [5] Path selection in mobile ad-hoc networks and distribution of path duration
    Han, Yijie
    La, Richard J.
    Zhang, Hongqiang
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 1 - +
  • [6] A Markov model-based location prediction scheme for mobile ad-hoc networks
    Denko, MK
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 179 - 184
  • [7] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    ELECTRONICS, 2021, 10 (04)
  • [8] Mitigating Misleading Routing Attack using Path Signature in Mobile Ad-Hoc Networks
    Kandah, Farah
    Singh, Yashaswi
    Zhang, Weiyi
    Ma, Yulu
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 617 - 622
  • [9] Using an updating of DHCP in mobile ad-hoc networks
    Ojeda-Guerra, CN
    Ley-Bosch, C
    Alonso-González, I
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2006, : 58 - 63
  • [10] Virtual Mobile Ad-hoc Networks
    Lahav, Jonathan
    Stulman, Ariel
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 433 - 434