Vulnerable Path Determination in mobile ad-hoc networks using Markov Model

被引:0
|
作者
Mukhopadhyay, Arunabha [1 ]
Das, Saini [2 ]
Sadhukhan, Samir [3 ]
Saha, Debashis [3 ]
机构
[1] Indian Inst Management Lucknow, Lucknow, Uttar Pradesh, India
[2] Inst Management Technol, Hyderabad, India
[3] Indian Inst Management Calcutta, Kolkata, India
来源
AMCIS 2013 PROCEEDINGS | 2013年
关键词
PISMS; vulnerable path determination module; information sensitive ad-hoc networks; Forward direction based mobility; Non-orthogonal Cartesian System; Transition probability; Markov model; ISADM; RISK-ASSESSMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security threats are of major concern in information sensitive mobile ad-hoc networks (MANETs) like emergency military communication networks. We propose a Proactive Information Security Management System (PISMS) framework with vulnerable path determination module (VPDM) for such mobile ad-hoc networks. The chief security officer can use it to identify the most vulnerable paths, so that they can be patched using suitable security technologies before the hackers actually attack and compromise them. Our PISMS computes (i) the probability of transitioning from each node to its adjacent neighbors, using two key indicators (angle and distance); (ii) number of steps required to reach a pre-determined destination from different sources using Markov model. The path that requires minimum number of steps to reach a destination is the most vulnerable path. This mechanism of identifying vulnerable path is incorporated as an integral part of the Information systems acquisition, development and maintenance (ISADM) module of ISMS framework ISO27001.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Reliability Evaluation of Mobile Ad-hoc Networks
    Choudhary, Anil
    Roy, O. P.
    Tuithung, T.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (05): : 207 - 220
  • [32] Connectivity Service for Mobile Ad-Hoc Networks
    Cornejo, Alejandro
    Lynch, Nancy
    SASOW 2008: SECOND IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS, PROCEEDINGS, 2008, : 292 - 297
  • [33] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
  • [34] Cluster maintenance in mobile ad-hoc networks
    Wang, L
    Olariu, S
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2005, 8 (2-3): : 111 - 118
  • [35] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [36] Interference Criteria for Mobile Ad-Hoc Networks
    Boksiner, Jeffrey
    Posherstnik, Yuriy
    Yeager, Richard O.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1427 - 1432
  • [37] An Optimization Strategy for Mobile Ad-hoc Networks
    Luo, Jianlu
    Yang, Juan
    Cheng, Fang
    Fu, Dandan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 921 - 925
  • [38] Group Monitoring in Mobile Ad-Hoc Networks
    Gaba, Albana
    Voulgaris, Spyros
    van Steen, Maarten
    NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
  • [39] Cluster Maintenance in Mobile Ad-hoc Networks
    Lan Wang
    Stephan Olariu
    Cluster Computing, 2005, 8 : 111 - 118
  • [40] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70