Abstract
Mobile Ad Hoc Networks are vulnerable to security attacks that aim at disrupting routing information, exhausting nodes resources, maliciously manipulating data traffic etc. Construction of security mechanisms for Mobile Ad Hoc Networks is complicated by the fact that they lack a network infrastructure and a central authority for authentication and distribution of cryptographic keys.
In this paper is presented a theoretical model of an Artificial Immune System inspired by the vertebrate immune system. The objective of the proposed AIS is protection and reaction against known and unknown dysfunctions or attacks in a Mobile Ad Hoc Network that uses IPv6 addresses. This AIS also includes features inspired by Danger Theory, one of the latest immunological findings and a point of hot debate in the area of immunology.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Timmis, J., Knight, T., de Castro, L.N., Hart, E.: An Overview of Artificial Immune Systems. In: Computation in Cells and Tissues: Perspectives and tools for thought. Natural Computation Series, pp. 51–86 (November 2004)
Aura, T.: Cryptographically Generated Addresses (CGA). RFC 3972 (March 2005) (Work in Progress)
Hinden, R., Deering, S.: Internet Protocol Version 6 (IPv6) Addressing Architecture (April 2003)
Corson, S., Macker, J.: Mobile Adhoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501 (January 1999) (Work in Progress)
Royer, E.M., Toh, C.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications (April 1999)
Matzinger, P.: The Danger Model in Its Historical Context. Scandinavian Journal of Immunology (2001)
Matzinger, P.: Tolerance, Danger and the Extended Family. Annual Review of Immunology (1994)
Hofmeyr, S., Forrest, S., Somayaji, A.: Intrusion Detection Using Sequences of System Calls. Journal of Computer Security (1998)
Wagner, D., Soto, P.: Mimicry Attacks on Host-based Intrusion Detection Systems. In: Proc. of the 9th ACM Conference on Computer and Communications Security (2002)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (July 2003) (Work in Progress)
Kim, J., Bentley, P.: Evaluating Negative Selection in an AIS for Network Intrusion Detection. Genetic and Evolutionary Computation Conference, pp. 1330–1337 (2001)
Ping, Y., Yan, Y., Yafei, H., Yiping, Z., Shiyong, Z.: Securing Ad Hoc Networks through mobile agent. In: Proceedings of the 3rd international conference on Information security, Shanghai, China, pp. 125–129 (2004)
Le Boudec, J., Sarafijanovic, S.: An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks. In: Proceedings of Bio-ADIT 2004 (The First International Workshop on Biologically Inspired Approaches to Advanced Information Technology), Lausanne, Switzerland, January 29-30, pp. 96–111 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rrushi, J.L. (2006). Securing IPv6-Based Mobile Ad Hoc Networks Through an Artificial Immune System. In: Apolloni, B., Marinaro, M., Nicosia, G., Tagliaferri, R. (eds) Neural Nets. WIRN NAIS 2005 2005. Lecture Notes in Computer Science, vol 3931. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11731177_41
Download citation
DOI: https://doi.org/10.1007/11731177_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33183-4
Online ISBN: 978-3-540-33184-1
eBook Packages: Computer ScienceComputer Science (R0)