Please use this identifier to cite or link to this item:
https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1545
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mukhopadhyay, Arunabha | |
dc.contributor.author | Das, Saini | |
dc.contributor.author | Sadhukhan, Samir K. | |
dc.contributor.author | Saha, Debashish | |
dc.date.accessioned | 2021-08-26T06:23:37Z | - |
dc.date.available | 2021-08-26T06:23:37Z | - |
dc.date.issued | 2013 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893290689&partnerID=40&md5=9b005f99e7c745d9356384b402ad3f1a | |
dc.identifier.uri | https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1545 | - |
dc.description | Mukhopadhyay, Arunabha, Indian Institute of Management Lucknow, India; Das, Saini, Institute of Management Technology, Hyderabad, India; Sadhukhan, Samir K., Indian Institute of Management Calcutta, India; Saha, Debashish, Indian Institute of Management Calcutta, India | |
dc.description | ISSN/ISBN - 978-162993394-8 | |
dc.description | pp.3938-3949 | |
dc.description.abstract | Security threats are of major concern in information sensitive mobile ad-hoc networks (MANETs) like emergency military communication networks. We propose a Proactive Information Security Management System (PISMS) framework with vulnerable path determination module (VPDM) for such mobile ad-hoc networks. The chief security officer can use it to identify the most vulnerable paths, so that they can be patched using suitable security technologies before the hackers actually attack and compromise them. Our PISMS computes (i) the probability of transitioning from each node to its adjacent neighbors, using two key indicators (angle and distance); (ii) number of steps required to reach a pre-determined destination from different sources using Markov model. The path that requires minimum number of steps to reach a destination is the most vulnerable path. This mechanism of identifying vulnerable path is incorporated as an integral part of the Information systems acquisition, development and maintenance (ISADM) module of ISMS framework ISO27001. © (2013) by the AIS/ICIS Administrative Office All rights reserved. | |
dc.publisher | SCOPUS | |
dc.publisher | 19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime | |
dc.relation.ispartofseries | 5 | |
dc.subject | Forward direction based mobility | |
dc.subject | Information sensitive ad-hoc networks | |
dc.subject | ISADM | |
dc.subject | Markov model | |
dc.subject | Non-orthogonal cartesian system | |
dc.subject | PISMS | |
dc.subject | Transition probability | |
dc.subject | Vulnerable path determination module | |
dc.title | Vulnerable path determination in mobile ad-hoc networks using markov model | |
dc.type | Conference Paper | |
Appears in Collections: | Management Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.