Skip to main content

Securing IPv6-Based Mobile Ad Hoc Networks Through an Artificial Immune System

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3931))

Abstract

Mobile Ad Hoc Networks are vulnerable to security attacks that aim at disrupting routing information, exhausting nodes resources, maliciously manipulating data traffic etc. Construction of security mechanisms for Mobile Ad Hoc Networks is complicated by the fact that they lack a network infrastructure and a central authority for authentication and distribution of cryptographic keys.

In this paper is presented a theoretical model of an Artificial Immune System inspired by the vertebrate immune system. The objective of the proposed AIS is protection and reaction against known and unknown dysfunctions or attacks in a Mobile Ad Hoc Network that uses IPv6 addresses. This AIS also includes features inspired by Danger Theory, one of the latest immunological findings and a point of hot debate in the area of immunology.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Timmis, J., Knight, T., de Castro, L.N., Hart, E.: An Overview of Artificial Immune Systems. In: Computation in Cells and Tissues: Perspectives and tools for thought. Natural Computation Series, pp. 51–86 (November 2004)

    Google Scholar 

  2. Aura, T.: Cryptographically Generated Addresses (CGA). RFC 3972 (March 2005) (Work in Progress)

    Google Scholar 

  3. Hinden, R., Deering, S.: Internet Protocol Version 6 (IPv6) Addressing Architecture (April 2003)

    Google Scholar 

  4. Corson, S., Macker, J.: Mobile Adhoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501 (January 1999) (Work in Progress)

    Google Scholar 

  5. Royer, E.M., Toh, C.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications (April 1999)

    Google Scholar 

  6. Matzinger, P.: The Danger Model in Its Historical Context. Scandinavian Journal of Immunology (2001)

    Google Scholar 

  7. Matzinger, P.: Tolerance, Danger and the Extended Family. Annual Review of Immunology (1994)

    Google Scholar 

  8. Hofmeyr, S., Forrest, S., Somayaji, A.: Intrusion Detection Using Sequences of System Calls. Journal of Computer Security (1998)

    Google Scholar 

  9. Wagner, D., Soto, P.: Mimicry Attacks on Host-based Intrusion Detection Systems. In: Proc. of the 9th ACM Conference on Computer and Communications Security (2002)

    Google Scholar 

  10. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (July 2003) (Work in Progress)

    Google Scholar 

  11. Kim, J., Bentley, P.: Evaluating Negative Selection in an AIS for Network Intrusion Detection. Genetic and Evolutionary Computation Conference, pp. 1330–1337 (2001)

    Google Scholar 

  12. Ping, Y., Yan, Y., Yafei, H., Yiping, Z., Shiyong, Z.: Securing Ad Hoc Networks through mobile agent. In: Proceedings of the 3rd international conference on Information security, Shanghai, China, pp. 125–129 (2004)

    Google Scholar 

  13. Le Boudec, J., Sarafijanovic, S.: An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks. In: Proceedings of Bio-ADIT 2004 (The First International Workshop on Biologically Inspired Approaches to Advanced Information Technology), Lausanne, Switzerland, January 29-30, pp. 96–111 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rrushi, J.L. (2006). Securing IPv6-Based Mobile Ad Hoc Networks Through an Artificial Immune System. In: Apolloni, B., Marinaro, M., Nicosia, G., Tagliaferri, R. (eds) Neural Nets. WIRN NAIS 2005 2005. Lecture Notes in Computer Science, vol 3931. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11731177_41

Download citation

  • DOI: https://doi.org/10.1007/11731177_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33183-4

  • Online ISBN: 978-3-540-33184-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics