MANET: Securing AODV Based on a Combined Immune Theories Algorithm (CITA)

被引:0
作者
Khannous, Anass [1 ]
Elouaai, Fatiha [1 ]
Rghioui, Anass [1 ]
Bouhorma, Mohammed [1 ]
机构
[1] Abdelmalek Essaadi Univ, Fac Sci & Technol Tangier, LIST, Tetouan, Morocco
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 09期
关键词
MANET; Security; Combined Immune Theories Algorithm; CITA; Artificial Immune system; AODV; routing attacks;
D O I
10.14257/ijsia.2016.10.9.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc Networks consist of a set of mobile nodes communicating with each other in a decentralized and dynamic topology where nodes provide retransmission capabilities. Communications between source nodes and destinations go through routes represented by a set of intermediate nodes that are required to adapt and behave in response to some actions according to orders given by the chosen routing protocol. Absence of a centralized architecture, in addition to open wireless medium of Ad hoc networks, as well as nodes mobility are ones of the network characteristics that render the environment much vulnerable to different routing attacks. A wide range of current researches focus on enhancing MANET security using various techniques like cryptography, but these mechanisms creates too much overhead. Artificial Immune Systems provide intrusion detection techniques based on the abstraction of the human immune system. They are known to be very efficient and lightweight algorithms. Multiple immune theories are implemented like Negative selection, Clonal selection, Danger theory, Immune network... etc. This paper proposes the use of combined immune theories as an Intrusion Detection System that integrates to the AODV routing protocol and that can sense the presence of non-trusted nodes, as it can eliminate them from the network. The proposed approach is tested and validated in presence of Packet Dropping Attack. Promising results in terms of network performance then are discussed.
引用
收藏
页码:211 / 228
页数:18
相关论文
共 20 条
[1]  
Abdelhaq Maha, 2011, International Journal of New Computer Architectures and their Applications, V1, P534
[2]  
Abdelhaq M, 2011, COMM COM INF SC, V181, P429
[3]  
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[4]  
Aickelin U., 2008, DANGER THEORY ITS AP
[5]  
[Anonymous], 2004, IMMUNITY BASED SYSTE
[6]   Securing AODV: The A-SAODV secure routing prototype [J].
Cerri, Davide ;
Ghioni, Alessandro .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (02) :120-125
[7]  
Chaki N., 2014, NTRUSION DETECTION W
[8]  
DASGUPTA D, 2003, GEN EV COMP C GECCO
[9]  
De Castro L. N., 2000, IN P GECCO, P36, DOI DOI 10.1109/HIS.2008.11
[10]  
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580