Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Challenges: an application model for pervasive computing
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ad Hoc Wireless Networks: Protocols and Systems
Ad Hoc Wireless Networks: Protocols and Systems
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Artificial Immune Systems: A New Computational Intelligence Paradigm
Artificial Immune Systems: A New Computational Intelligence Paradigm
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Dendritic cells for SYN scan detection
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Immune system approaches to intrusion detection --- a review
Natural Computing: an international journal
A sense of danger: dendritic cells inspired artificial immune system for manet security
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Bee-Inspired Protocol Engineering: From Nature to Networks
Bee-Inspired Protocol Engineering: From Nature to Networks
BeeAIS: artificial immune system security for nature inspired, MANET routing protocol, BeeADHoc
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
PPSN'06 Proceedings of the 9th international conference on Parallel Problem Solving from Nature
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Articulation and clarification of the dendritic cell algorithm
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
IEEE Transactions on Neural Networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Abstract: Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: (1) mobility results in continuously changing network topology - the premise of stable self or non-self is void, (2) the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile nodes, and (3) the solution should provide high detection accuracy and low false positive rate. The major contribution of this paper is a hybrid AIS model - combining the relevant features of classical self/non-self paradigm with the emerging danger theory paradigm - that has the capability to meet the above-mentioned challenges of the MANET environment. As a case study, we use our hybrid model to develop a power aware security framework for BeeAdHoc- a well-known bio-inspired routing protocol. We have realized our framework in ns-2 simulator. We have also developed an attacker framework in ns-2 that has the capability to launch a number of Byzantine attacks on BeeAdHoc. The results of our experiments show that our proposed framework meets all its requirements: (1) the adaptive learning because of changing self/non-self, (2) high detection accuracy and low false positive rate, (3) lightweight in terms of processing and communication overheads, and (4) better or comparable performance compared with non-secure versions of existing state-of-the-art MANET routing protocols -DSR and AODV. We have also compared our hybrid AIS model with self/non-self, danger theory and a conventional anomaly detection system to show its merits over these schemes. Finally, we propose an extension of the framework for securing DSR.