earticle

논문검색

MANET : Securing AODV Based on a Combined Immune Theories Algorithm (CITA)

초록

영어

Mobile Ad hoc Networks consist of a set of mobile nodes communicating with each other in a decentralized and dynamic topology where nodes provide retransmission capabilities. Communications between source nodes and destinations go through routes represented by a set of intermediate nodes that are required to adapt and behave in response to some actions according to orders given by the chosen routing protocol. Absence of a centralized architecture, in addition to open wireless medium of Ad hoc networks, as well as nodes mobility are ones of the network characteristics that render the environment much vulnerable to different routing attacks. A wide range of current researches focus on enhancing MANET security using various techniques like cryptography, but these mechanisms creates too much overhead. Artificial Immune Systems provide intrusion detection techniques based on the abstraction of the human immune system. They are known to be very efficient and lightweight algorithms. Multiple immune theories are implemented like Negative selection, Clonal selection, Danger theory, Immune network...etc. This paper proposes the use of combined immune theories as an Intrusion Detection System that integrates to the AODV routing protocol and that can sense the presence of non-trusted nodes, as it can eliminate them from the network. The proposed approach is tested and validated in presence of Packet Dropping Attack. Promising results in terms of network performance then are discussed.

목차

Abstract
 1. Introduction
 2. Protection Mechanism of the Human Immune System
  2.1. Identification Process
  2.2. Activation Process of HIS
 3. Research Background
  3.1. Negative Selection Algorithm
  3.2. Clonal Selection Algorithm
  3.3 Danger Theory & Dendritic Cell Algorithm
 4. Security Attacks on AODV
 5. Combined Immune Theories Algorithm
  5.1. Involved Immune Theories
  5.3. CITA Algorithm
  5.4. Monitoring & Reputation Systems
  5.5. Integration of CITA with AODV Routing Protocol
 6. Results and Discussions
  6.1. Simulation Environment and Parameters
  6.2. Setting up some Initial Parameters
  6.3. Performance Parameters & Evaluation
 7. Conclusions and Perspectives
 References

저자정보

  • Anass Khannous LIST, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
  • Fatiha Elouaai LIST, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
  • Anass Rghioui LIST, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
  • Mohammed Bouhorma LIST, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.