Immune Inspired Framework for Ad Hoc Network Security

As a comprehensive security system, researchers recently have turned to the human immune system as a very wealthy source of inspiration. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the research interest which can be pointed out. By...

Full description

Bibliographic Details
Main Authors: Yasir Abdelgadir , Mohamed, Azween, Abdullah
Format: Conference or Workshop Item
Language:English
Published: 2009
Subjects:
Online Access:http://scholars.utp.edu.my/id/eprint/2267/
http://scholars.utp.edu.my/id/eprint/2267/1/ICCA09_conference-77.pdf
_version_ 1848659221208367104
author Yasir Abdelgadir , Mohamed
Azween, Abdullah
author_facet Yasir Abdelgadir , Mohamed
Azween, Abdullah
author_sort Yasir Abdelgadir , Mohamed
building UTP Institutional Repository
collection Online Access
description As a comprehensive security system, researchers recently have turned to the human immune system as a very wealthy source of inspiration. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the research interest which can be pointed out. By means of diverse kinds of cells, molecules, and mechanisms, the immune system efficiently protects the human body against different kinds of attacks. Many immune-inspired techniques have been developed with the aim to tackle different computing problems. Network security represents one of the most significant fields that the immune-inspired techniques have been applied to. Given that mobile ad hoc networks have a decentralized nature similar to the human immune system (HIS), immune-inspired security architecture is highly expected to come across different ad hoc security problems, one of which is the malicious node that can disrupt the routing process, masquerade as the legitimate nodes, and impersonate the trusted nodes. In this paper, immune-inspired security architecture for simulating a number of HIS processes for securing mobile ad hoc networks is presented. Both the negative selection and danger theory techniques have been combined along with many other inspired processes to come up with a scalable and robust system. Distributability, second response and self recovery of nodes, are the hallmarks of the proposed architecture.
first_indexed 2025-11-13T07:26:58Z
format Conference or Workshop Item
id oai:scholars.utp.edu.my:2267
institution Universiti Teknologi Petronas
institution_category Local University
language English
last_indexed 2025-11-13T07:26:58Z
publishDate 2009
recordtype eprints
repository_type Digital Repository
spelling oai:scholars.utp.edu.my:22672017-01-19T08:25:08Z http://scholars.utp.edu.my/id/eprint/2267/ Immune Inspired Framework for Ad Hoc Network Security Yasir Abdelgadir , Mohamed Azween, Abdullah QA76 Computer software As a comprehensive security system, researchers recently have turned to the human immune system as a very wealthy source of inspiration. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the research interest which can be pointed out. By means of diverse kinds of cells, molecules, and mechanisms, the immune system efficiently protects the human body against different kinds of attacks. Many immune-inspired techniques have been developed with the aim to tackle different computing problems. Network security represents one of the most significant fields that the immune-inspired techniques have been applied to. Given that mobile ad hoc networks have a decentralized nature similar to the human immune system (HIS), immune-inspired security architecture is highly expected to come across different ad hoc security problems, one of which is the malicious node that can disrupt the routing process, masquerade as the legitimate nodes, and impersonate the trusted nodes. In this paper, immune-inspired security architecture for simulating a number of HIS processes for securing mobile ad hoc networks is presented. Both the negative selection and danger theory techniques have been combined along with many other inspired processes to come up with a scalable and robust system. Distributability, second response and self recovery of nodes, are the hallmarks of the proposed architecture. 2009-12 Conference or Workshop Item PeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/2267/1/ICCA09_conference-77.pdf Yasir Abdelgadir , Mohamed and Azween, Abdullah (2009) Immune Inspired Framework for Ad Hoc Network Security. In: 7th IEEE International Conference on Control & Automation (ICCA'09), December 9-11, 2009, Christchurch, New Zealand.
spellingShingle QA76 Computer software
Yasir Abdelgadir , Mohamed
Azween, Abdullah
Immune Inspired Framework for Ad Hoc Network Security
title Immune Inspired Framework for Ad Hoc Network Security
title_full Immune Inspired Framework for Ad Hoc Network Security
title_fullStr Immune Inspired Framework for Ad Hoc Network Security
title_full_unstemmed Immune Inspired Framework for Ad Hoc Network Security
title_short Immune Inspired Framework for Ad Hoc Network Security
title_sort immune inspired framework for ad hoc network security
topic QA76 Computer software
url http://scholars.utp.edu.my/id/eprint/2267/
http://scholars.utp.edu.my/id/eprint/2267/1/ICCA09_conference-77.pdf