Immune Inspired Approach for Securing Wireless Ad hoc Networks

被引:0
作者
Mohamed, Yasir Abdelgadir [1 ]
Abdullah, Azween B. [1 ]
机构
[1] Univ Teknol PETRONAS, Dept Comp & Informat Sci, Tronoh, Malaysia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2009年 / 9卷 / 07期
关键词
Security; MANETs; immune system; Mobile agent;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
New computational techniques are being developed based on the immune system concepts, seeking to solve several engineering problems. Moreover, mobile ad hoc networks (MANETs) have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. A security approach based on immune inspired properties and features is presented. Mobile agent system has been used so as to map different immune components that collaborate to defend the human body against different kinds of diseases. Distributed detection, first response, second response, self recovery, adaptability, and danger theory representation are the hallmarks of the proposed security approach which places emphasis on infrastructure less and high nodes mobility capabilities.
引用
收藏
页码:206 / 212
页数:7
相关论文
共 21 条
[1]  
Aickelin U, 2004, LECT NOTES COMPUT SC, V3239, P316
[2]  
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[3]  
chaudet Claude, 2003, MANAGED BANDWIDTH RE, P1
[4]  
De Castro L. N., 1999, 0199 TR DCA
[5]  
Fanelli RL, 2008, LECT NOTES COMPUT SC, V5132, P107, DOI 10.1007/978-3-540-85072-4_10
[6]   Computer immunology [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A .
COMMUNICATIONS OF THE ACM, 1997, 40 (10) :88-96
[7]  
Forrest S., 2002, INTERNET LARGE COMPL
[8]  
Forrest S., 1996, P 1996 IEEE S COMP S
[9]  
Gadir Yasir A., 2008, J ENG SCI TECHNOLOGY, P231
[10]   Architecture for an Artificial Immune System [J].
Hofmeyr, Steven A. ;
Forrest, Stephanie .
EVOLUTIONARY COMPUTATION, 2000, 8 (04) :443-473