Communications of the ACM
Principles of a computer immune system
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Secure Link State Routing for Mobile Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Architecture for an Artificial Immune System
Evolutionary Computation
IEEE Network: The Magazine of Global Internetworking
Securing IPv6-Based mobile ad hoc networks through an artificial immune system
WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
A peer-to-peer blacklisting strategy inspired by leukocyte-endothelium interaction
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Hi-index | 0.00 |
A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The flexibility in space and time induces new challenges towards the security infrastructure. Contrary to their wired counterpart, mobile ad hoc networks do not have a clear line of defense, and every node must be prepared for encounters with an adversary. Therefore, a centralized or hierarchical network security solution does not work well. We provide scalable, distributed security architecture for mobile ad hoc networks in this paper. The architecture integrates the ideas of immune system and a multi-agent architecture. Compared with traditional security system, the proposed security architecture is designed to be distributed, autonomy, adaptability, scalability.