Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available. Forwarding packets or participating in routing process, either of each can directly affect the network security state. Nevertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks. Even though immune-inspired approaches aren't essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multiagent paradigm is presented. Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility. Appropriate Я found Communicate with the Corrupted node' system. Recover Я uploaded Properly configured Fig. 7. Basic CPN Model for Replicate Agent.
2010
One of the main security issues in mobile ad hoc networks (MANETs) is a malicious node that can falsify a route advertisement, overwhelm traffic without forwarding it, help to forward corrupted data and inject false or uncompleted information, and many other security problems. Mapping immune system mechanisms to networking security is the main objective of this paper which may significantly contribute in securing MANETs. In a step for providing secured and reliable broadband services, formal specification logic along with a novel immuneinspired security framework (I 2 MANETs) are introduced. The different immune components are synchronized with the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the Human Immune System in first response, second response, adaptability, distributability, and survivability and other immune features and properties. Interoperability with different routing protocols is considered. The framework has been implemented in a real environment. Desired and achieved results are presented.
Control and Automation, 2009. …, 2009
As a comprehensive security system, researchers recently have turned to the human immune system as a very wealthy source of inspiration. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the research interest which can be pointed out. By means of diverse kinds of cells, molecules, and mechanisms, the immune system efficiently protects the human body against different kinds of attacks. Many immune-inspired techniques have been developed with the aim to tackle different computing problems. Network security represents one of the most significant fields that the immune-inspired techniques have been applied to. Given that mobile ad hoc networks have a decentralized nature similar to the human immune system (HIS), immune-inspired security architecture is highly expected to come across different ad hoc security problems, one of which is the malicious node that can disrupt the routing process, masquerade as the legitimate nodes, and impersonate the trusted nodes. In this paper, immune-inspired security architecture for simulating a number of HIS processes for securing mobile ad hoc networks is presented. Both the negative selection and danger theory techniques have been combined along with many other inspired processes to come up with a scalable and robust system. Distributability, second response and self recovery of nodes, are the hallmarks of the proposed architecture.
2009
A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability environment in each. In a step for providing secured and reliable broadband services, formal specification logic along with a novel immune-inspired security framework (I2MANETs) have been introduced. The different immune components synchronized to the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the human immune system in: first response, second response, adaptability, distributability, survivability and other immune features. The I2MANETs can basically installed in one node in the domain, then automatically spread to the rest of the domain.
2016
Mobile ad hoc network (MANET) is a dynamic and promising research domain that contributes to the development of wireless networks. MANET characteristics such as dynamic topology, open media access, wireless communication, and resource limitations introduce several security threats. The MANET security is then Vulnerable. The use of traditional security techniques cannot be directly applied for the case of MANET, hence the need to develop more suitable methods and security algorithms. Artificial immune systems have been widely used in the field of MANET security. Several immune algorithms were used and implemented as intrusion detection systems (IDS). This paper gives an overview of major immune algorithms like Negative Selection Algorithm, Clonal Selection, and the danger theory. It then describes our approach to implement an IDS based on the combination of these immune algorithms to better simulate the human defense mechanism. The proposed algorithm is named “Combined Immune Theorie...
International Journal of Security and Its Applications, 2016
Mobile Ad hoc Networks consist of a set of mobile nodes communicating with each other in a decentralized and dynamic topology where nodes provide retransmission capabilities. Communications between source nodes and destinations go through routes represented by a set of intermediate nodes that are required to adapt and behave in response to some actions according to orders given by the chosen routing protocol. Absence of a centralized architecture, in addition to open wireless medium of Ad hoc networks, as well as nodes mobility are ones of the network characteristics that render the environment much vulnerable to different routing attacks. A wide range of current researches focus on enhancing MANET security using various techniques like cryptography, but these mechanisms creates too much overhead. Artificial Immune Systems provide intrusion detection techniques based on the abstraction of the human immune system. They are known to be very efficient and lightweight algorithms. Multiple immune theories are implemented like Negative selection, Clonal selection, Danger theory, Immune network...etc. This paper proposes the use of combined immune theories as an Intrusion Detection System that integrates to the AODV routing protocol and that can sense the presence of non-trusted nodes, as it can eliminate them from the network. The proposed approach is tested and validated in presence of Packet Dropping Attack. Promising results in terms of network performance then are discussed.
International Journal of Communications, Network and System Sciences, 2016
Mobile ad hoc networks (MANETs) are collections of wireless mobile devices that form a communication network with restricted broadcast range, limited resources and without fixed infrastructure. Routing is a critical function in multi-hop MANETs. At the same time, security in MANETsespecially routing security-presents a number of new and interesting challenges. Communication is achieved by relaying data along routes that are dynamically discovered and maintained through collaboration between the nodes. Advances in the field of artificial immune systems provide an opportunity to improve MANET security and performance. Artificial immune systems mimic the functionality of the human immune system wherein there is clear distinction between self and non self and this delineation is important in a MANET where there is no centralized management. The high level of protection provided to the human body by an evolved immune system can be applied as a security feature in MANET. The current security techniques proposed for MANET have varying degrees of success due to the dynamic nature of a MANET. This paper will review different strategies for the application of artificial immune systems to MANETs.
2011
Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: (1) mobility results in continuously changing network topology-the premise of stable self or non-self is void, (2) the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile nodes, and (3) the solution should provide high detection accuracy and low false positive rate. The major contribution of this paper is a hybrid AIS model-combining the relevant features of classical self/non-self paradigm with the emerging danger theory paradigm-that has the capability to meet the above-mentioned challenges of the MANET environment. As a case study, we use our hybrid model to develop a power aware security framework for BeeAdHoc-a well-known bio-inspired routing protocol. We have realized our framework in ns-2 simulator. We have also developed an attacker framework in ns-2 that has the capability to launch a number of Byzantine attacks on BeeAdHoc. The results of our experiments show that our proposed framework meets all its requirements: (1) the adaptive learning because of changing self/non-self, (2) high detection accuracy and low false positive rate, (3) lightweight in terms of processing and communication overheads, and (4) better or comparable performance compared with non-secure versions of existing state-of-the-art MANET routing protocols-DSR and AODV. We have also compared our hybrid AIS model with self/non-self, danger theory and a conventional anomaly detection system to show its merits over these schemes. Finally, we propose an extension of the framework for securing DSR.
Security and Communication Networks, 2010
In this paper, we propose a new architecture based on an efficient trust model and Secure Distributed Clustering Algorithm (SDCA) in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of a fully self-organized security for trust models like P GP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust and mobility metrics, in order to select the clusterhead and to establish P KI in each cluster for authentication and exchange of data. Furthermore, we present a new approach: the Dynamic Demilitarized Zone (DDM Z) to protect the CA in each cluster. The principal idea of DDM Z consists in selecting the dispensable nodes, also called registration authorities (RA); these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to the CA. With this approach, we can avoid the single point of failure in each cluster. Moreover, we propose a probabilistic model to define the direct connectivity between confident nodes in order to study the resistance degree of the DDM Z against different attacks. In addition, we evaluate the performance of the proposed SDCA and we estimate the robustness and the availability of DDM Z through the simulations. The effects of direct connectivity and transmission range on the stability and security of the network are analysed. The simulation's results confirm that the proposed architecture is scalable, secure and more resistant against attacks. † This work is supported by the ANR "Agence Nationale de la Recherche -France" within the project framework ARA/CLADIS. can communicate with each other by using multihop links to forward traffic from the source to the destination. The nodes' mobility results in a dynamically changing network topology. All these characteristics make MANET original and popular in different application fields such as rescue missions, military operations, etc. However, the characteristics of MANET make it vulnerable to several attacks. In addition, a lack of central administration entity in MANET makes the existing security solutions not applicable to MANET. Hence, providing secure solutions for MANET is a challenge task. The goal of secure solutions is to provide security services,
International Conference on Emerging Security Information, Systems and Technologies, 2009
Mobile Ad hoc Networks (MANETs) have lots of applications. Due to the features of open medium, absence of infrastructure, dynamic changing network topology, cooperative algorithms, lack of centralized monitoring and management point, resource constraints and lack of a clear line of defense, these networks are vulnerable to attacks. A vital problem that must be solved in order to realize these
International Journal of Computer Applications, 2016
The mobile Ad-hoc Network is infrastructureless network, self-organizing on demand wireless network. It means the formed network can be deformed on the fly without any centralized control. This gives rise to topology change and in turn exposes MANETs to different security attacks. And to deal with these topology changes different protocols have be devised and discussed in this paper but still these protocols are not fully capable to cope up these challenges and are open to researchers for proper attention. A Mobile Agent has a unique feature to move from one system to another in the same network. This ability helps researchers to cope up with security issues in MANETs to some extent.
International Journal of Computer Applications, 2014
The use of artificial immune systems (AIS) in intrusion detection is an attractive concept for several reasons. Then it is judicious to expect that approaches of biological inspirations in this area, and specifically the abstraction of immune defense mechanism with its high detection capabilities and its strong defense against intrusion, will probably be able to meet this challenge. Researchers have implemented different immune models to design intrusion detection systems (IDS) in order to secure Mobile Ad Hoc Networks (MANET), but the most popular one is the self and non-self model. This model was used in the vast majority of biological inspiration in the field of MANET security. It has demonstrated attractive success, as well as it showed some weakness especially in terms of scalability and coverage. This paper try to incorporate some additional concepts proposed by the new danger theory in order to overcome some of the problems related to the adoption of the self and non-selfmodel. The proposed algorithm integrates and combines the basic concepts of intrusion detection system based on the role of T cells described by the negative selection algorithm, with those inspired by the role of dendritic cells to process the alarm signals and to judge thereafter whether there is presence of a dangerous element or not.
In MANET decision-making, key-distribution, routing and forwarding packets are usually decentralized and many of them depend on the cooperative participation among all nodes. MANET is particularly susceptible to several attacks ranging from passive eavesdropping to active interfering due to their open medium; this is in contrast to wired networks, where an opposition must gain physical access to the network wires to be able to make such type of attacks. The main contribution in this paper is to increase the efficiency of intrusion detection system in MANET, by decreasing the false-positives. The modules used in proposed system are node generation, clustering of nodes, Route discovery, shortest distance path, attacker detection such as the node is attacker or not. While using Nash Equilibrium in networks to detect multiple attackers present in MANETs. The Nash equilibrium determines various node strategies in clusters of nodes. Simulation results show that the mobile utility, performance, stability of MANET’s, the proposed scheme can enable to prevent attackers with fully distributed nature.
The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, creating a balance between utilizing HIS on one side and introducing the required AIS-based intrusion detection algorithm on the other side is a crucial issue which would be valuable to investigate. Securing the mobile ad hoc network (MANET) which is a collection of mobile, decentralized, and self organized nodes is another problem, which adds more challenges to the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AISs' properties such as being self-healing, self-defensive and self-organizing can meet the challenges of securing the MANET environment. This paper's objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. Furthermore, this study proposes a DCIIDA architecture which should be applied by each node in MANET.
International Journal of Computer Applications, 2015
Mobile Ad-Hoc Networks (MANETS) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETS) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A lot of work is going on in the area of Intrusion detection, and response techniques to appease critical attacks. In existing system, binary isolation and DRC techniques are used to isolate the malicious nodes. However, binary isolation leads to unexpected network partitioning and DRC is associative and non-weighted. Therefore, in this paper, we present an adaptive risk-aware response mechanism using CSS-OLSR cooperative security scheme OLSR based on an extended Dempster-Shafer mathematical theory of evidence. The effectiveness of security mechanism is demonstrated by using network simulator NS2 software in which various metrics shows secured performance of the network.
A Mobile ad Hoc network is a kind of mobile network that is dynamically changing and they have a fully decentralized topology. The security of Mobile Ad hoc Network (MANET) is more rigorous than that of traditional network. Therefore security remains a major challenge for these networks due to their feature. Moreover in the absence of central monitoring points there is a lack of defense mechanism. An intermediate node which takes part in packet forwarding may behave differently and drop packets instead of forwarding them. This malicious node falsely advertises itself as a trustworthy node; such behavior is called black hole attack. In this paper security architecture for detecting a cooperative black hole attack is presented.
Journal of Electrical Engineering, 2018
Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect network performance. In this paper, we present our security architecture for MANETs which secures important aspects of the network. We bring trust model into the network and nodes are secured by different mechanisms tailored specifically for the use in distributed environment. We use Omnet++for network simulations. Simulations use delays measured on the real hardware and we analyze performance of the net...
International journal of engineering research and technology, 2018
Networks formed for specific applications are called ad-hoc networks. In an ad-hoc model wireless devices can communicate with each other without the need of any central entity. All the devices that are in range of each other can discover and communicate to each other. Ad-hoc networks are flexible in every way, means they can be constructed, partitioned or merged with any other of the type on the go. In ad-hoc network, nodes are mobile in nature and uses wireless communication. In this case these are called as Mobile Ad-hoc Network (MANET). For these networks to find peer-to-peer path between working nodes, several protocols have been proposed. These routing protocols are supine to attack by the malicious nodes. The need of time is to detect and prevent the attacks caused by the malicious nodes without abruption in network services. In this paper, we present the study about various threats in security of MANETS and their detection and prevention techniques. Keywords— Ad-hoc networks...
Communications on Applied Electronics, 2017
One of the most important issues for mobile ad-hoc Networks (MANETs) is Security. The feature of MANETs posture both difficulties and openings in accomplishing security objectives, for example, privacy, validation, respectability, accessibility, control of access, and non-repudiation at the end. The techniques of Cryptographic are generally utilized for secure interchanges in wired and remote systems. Most mechanisms of cryptographic, for example, symmetric and asymmetric cryptography, frequently include the utilization of cryptographic keys. Nevertheless, every single cryptographic method will be useless if the management of the key is feeble. The Management of Key is additionally a focal segment in MANET security. The motivation behind key management is to give secure strategies to taking care of cryptographic keying materials.
arXiv (Cornell University), 2013
Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one of a major issue in MANET. Only prevention methods for attack are not enough. In this paper a new Intrusion Detection System (IDS) algorithm has proposed against selfish node attack to secure MANET. Here the behavior of selfish node is unnecessary flooding the information in network and block all types of packets transferring between the reliable nodes. Proposed IDS Algorithm identifies the behavior of selfish node and also blocked their misbehavior activities. In case of selfish node attack network performance is almost negligible but after applying IDS on attack network performance is enhanced up to 92% and provides 0% Infection rate from attack.
Security mechanism in wireless ad-hoc networks is a highly a challenging concern. Security in the MANET communication network is significant for secure transmission of information. Many security mechanisms for mobile ad-hoc network (MANET) have been proposed in the day to day events. Absence of any central co-ordination mechanism and shared wireless medium makes MANET more susceptible to cyber attacks than wired network there are a number of attacks that affect MANET. In MANET, all networking functions such as routing and packet distribution are performed by nodes in a self organizing manner. Due to these reasons, securing a Mobile Ad-hoc Network is very challenging. We consider the most common types of attacks, namely rushing attack, black hole attack, neighbor attack and jellyfish attack. Exclusively, we study how the number of attackers affects the performance metrics of a multicast session such as throughput, end-to-end delay, packet delivery ratio and delay jitter.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.