Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem

Abstract The Detection and Prevention system against many attacks has been formulated in Mobile ad hoc networks to secure the data and to provide the uninterrupted service to the legitimate clients. The formulation of opinion of neighbors or belief value or Trust value plays vital role in the detection system to avoid attacks. The attack detection system always extracts the behaviors of nodes to identify the attack patterns and prediction of future attacks. The False positives and false negatives plays vital role on identification of attackers accurately without any false positives and negatives .Our system uses the Aumann agreement theorem for convergence of Truth on opinion based on the bound of confidence value, such that truth consensus will maintained, The accuracy of system will be enhanced through this methodology

[1]  Xi Chen,et al.  Identity-Based Fully Distributed Certificate Authority in an OLSR MANET , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[2]  Jin-Hee Cho,et al.  Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks , 2010, Wirel. Networks.

[3]  S. Bose,et al.  Design of Intrusion Detection and Prevention System (IDPS) using DGSOTFC in collaborative protection networks , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).

[4]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[5]  Muneer O. Bani Yassein,et al.  Malicious Nodes Detection in MANETs: Behavioral Analysis Approach , 2012, J. Networks.

[6]  Zhiqun Deng,et al.  Data Distribution Algorithm Using Time Based Weighted Distributed Hash Tables , 2008, 2008 Seventh International Conference on Grid and Cooperative Computing.

[7]  Charles B. Owen,et al.  Factors affecting the performance of ad hoc networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[8]  R. Aumann Agreeing to disagree. , 1976, Nature cell biology.

[9]  Sarmistha Neogy,et al.  Secure checkpointing-recovery using trusted nodes in MANET , 2013, 2013 4th International Conference on Computer and Communication Technology (ICCCT).

[10]  Ramesh Govindan,et al.  Improving lookup latency in distributed hash table systems using random sampling , 2005, IEEE/ACM Transactions on Networking.

[11]  Lorenz Demey,et al.  Agreeing to disagree in probabilistic dynamic epistemic logic , 2013, Synthese.

[12]  Poongodi,et al.  Advances in Natural and Applied Sciences New Format.docx , 2015 .

[13]  Dijiang Huang,et al.  STARS: A Statistical Traffic Pattern Discovery System for MANETs , 2014, IEEE Transactions on Dependable and Secure Computing.

[14]  J. Trostle Applying network address encryption to anonymity and preventing data exfiltration , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[15]  N. Ganeshkumar,et al.  The effective intrusion detection system using optimal feature selection algorithm , 2015 .

[16]  Tameem Eissa,et al.  Enhancing MANET Security Using Secret Public Keys , 2009, 2009 International Conference on Future Networks.

[17]  Feng Luo,et al.  A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles , 2004, Bioinform..