Immune Inspired Framework for MANETs’ Security
-As a comprehensive security system, researchers recently had turned to the human immune system as a very wealthy inspiration source. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the researcher interest which can be pointed out...
| Main Authors: | , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/2588/ http://scholars.utp.edu.my/id/eprint/2588/1/ScoreD.pdf |
| _version_ | 1848659269710249984 |
|---|---|
| author | Yasir Abdelgadir , Mohamed Azween, Abdullah |
| author_facet | Yasir Abdelgadir , Mohamed Azween, Abdullah |
| author_sort | Yasir Abdelgadir , Mohamed |
| building | UTP Institutional Repository |
| collection | Online Access |
| description | -As a comprehensive security system, researchers
recently had turned to the human immune system as a very
wealthy inspiration source. DNA computation, evolutionary
computation, artificial neural networks, and artificial
immune systems are some of the researcher interest which
can be pointed out. By means of diverse kind of cells,
molecules, and mechanisms, the immune system efficiently
protects the human body against different kinds of attacks.
Many immune-inspired techniques have been developed
with the aim to settle different engineering computer
problems. Networking security is representing one of the
most significant fields that immune-inspired techniques
have been applied to. Given that mobile ad hoc networks
have a decentralized nature more similar to the human
immune system (HIS); immune-inspired security
architecture is highly expected to come across different ad
hoc security problems; one of which is the malicious node
that can disrupt the routing process, masquerade the
legitimate nodes, and impersonate the trusted nodes. In this
paper, immune-inspired security architecture for
stimulating a number of HIS processes for securing mobile
ad hoc networks has been presented. Both, the negative
selection and danger theory techniques have been combined
along with many other inspired processes so as to come up
with scalable a d robust system. Distributability, second
response, self recovery, is the hallmarks of the proposed
architecture which put a consideration on high nodes |
| first_indexed | 2025-11-13T07:27:45Z |
| format | Conference or Workshop Item |
| id | oai:scholars.utp.edu.my:2588 |
| institution | Universiti Teknologi Petronas |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-13T07:27:45Z |
| publishDate | 2008 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | oai:scholars.utp.edu.my:25882017-01-19T08:26:04Z http://scholars.utp.edu.my/id/eprint/2588/ Immune Inspired Framework for MANETs’ Security Yasir Abdelgadir , Mohamed Azween, Abdullah QA75 Electronic computers. Computer science -As a comprehensive security system, researchers recently had turned to the human immune system as a very wealthy inspiration source. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the researcher interest which can be pointed out. By means of diverse kind of cells, molecules, and mechanisms, the immune system efficiently protects the human body against different kinds of attacks. Many immune-inspired techniques have been developed with the aim to settle different engineering computer problems. Networking security is representing one of the most significant fields that immune-inspired techniques have been applied to. Given that mobile ad hoc networks have a decentralized nature more similar to the human immune system (HIS); immune-inspired security architecture is highly expected to come across different ad hoc security problems; one of which is the malicious node that can disrupt the routing process, masquerade the legitimate nodes, and impersonate the trusted nodes. In this paper, immune-inspired security architecture for stimulating a number of HIS processes for securing mobile ad hoc networks has been presented. Both, the negative selection and danger theory techniques have been combined along with many other inspired processes so as to come up with scalable a d robust system. Distributability, second response, self recovery, is the hallmarks of the proposed architecture which put a consideration on high nodes 2008-11-27 Conference or Workshop Item PeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/2588/1/ScoreD.pdf Yasir Abdelgadir , Mohamed and Azween, Abdullah (2008) Immune Inspired Framework for MANETs’ Security. In: 6th student conference on research and development (SCOReD08), 26-27 NOV.08, Unviversity Technology MALAYSIA. |
| spellingShingle | QA75 Electronic computers. Computer science Yasir Abdelgadir , Mohamed Azween, Abdullah Immune Inspired Framework for MANETs’ Security |
| title | Immune Inspired Framework for MANETs’ Security |
| title_full | Immune Inspired Framework for MANETs’ Security |
| title_fullStr | Immune Inspired Framework for MANETs’ Security |
| title_full_unstemmed | Immune Inspired Framework for MANETs’ Security |
| title_short | Immune Inspired Framework for MANETs’ Security |
| title_sort | immune inspired framework for manets’ security |
| topic | QA75 Electronic computers. Computer science |
| url | http://scholars.utp.edu.my/id/eprint/2588/ http://scholars.utp.edu.my/id/eprint/2588/1/ScoreD.pdf |