Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
immunology inspiration has been more flourishing in helping to put up the wonderful defense, basically in securing ad hoc networks. Imperfect detection, anomaly detection, memory response, diversity, and adaptive detection, all are some of the immune features that offer a worthy concept for solving...
| Main Authors: | , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/689/ http://scholars.utp.edu.my/id/eprint/689/1/yasir_honet.pdf |
| _version_ | 1848659025368973312 |
|---|---|
| author | Yasir Abdelgadir , Mohamed Azween, Abdullah |
| author_facet | Yasir Abdelgadir , Mohamed Azween, Abdullah |
| author_sort | Yasir Abdelgadir , Mohamed |
| building | UTP Institutional Repository |
| collection | Online Access |
| description | immunology inspiration has been more flourishing in helping to put up the wonderful defense, basically in securing ad hoc networks. Imperfect detection, anomaly detection, memory response, diversity, and adaptive detection, all are some of the immune features that offer a worthy concept for solving security problems. The essence of the immune system is the ability to discriminate between the self (legitimate users, corrupted data, etc.), and nonself (unauthorized users, viruses etc.) [1], moreover, all these attractive features amazed the researcher from which immune inspiration comes. We believe that ad hoc networks need a stronger, decentralized security system; this can be achieved if some of the immune system features are applied. Furthermore, ad hoc networks have no clear line of defense and no fixed infrastructure, so the known security techniques used for cabled networks might not work perfectly. A security architecture based on both immunity and multi-agent paradigm is presented. In this paper, distributability, second response, and self recovery are the hallmarks of the proposed security model which places emphasis on high nodes mobility |
| first_indexed | 2025-11-13T07:23:52Z |
| format | Conference or Workshop Item |
| id | oai:scholars.utp.edu.my:689 |
| institution | Universiti Teknologi Petronas |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-13T07:23:52Z |
| publishDate | 2008 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | oai:scholars.utp.edu.my:6892017-01-19T08:26:48Z http://scholars.utp.edu.my/id/eprint/689/ Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks Yasir Abdelgadir , Mohamed Azween, Abdullah QA75 Electronic computers. Computer science immunology inspiration has been more flourishing in helping to put up the wonderful defense, basically in securing ad hoc networks. Imperfect detection, anomaly detection, memory response, diversity, and adaptive detection, all are some of the immune features that offer a worthy concept for solving security problems. The essence of the immune system is the ability to discriminate between the self (legitimate users, corrupted data, etc.), and nonself (unauthorized users, viruses etc.) [1], moreover, all these attractive features amazed the researcher from which immune inspiration comes. We believe that ad hoc networks need a stronger, decentralized security system; this can be achieved if some of the immune system features are applied. Furthermore, ad hoc networks have no clear line of defense and no fixed infrastructure, so the known security techniques used for cabled networks might not work perfectly. A security architecture based on both immunity and multi-agent paradigm is presented. In this paper, distributability, second response, and self recovery are the hallmarks of the proposed security model which places emphasis on high nodes mobility 2008 Conference or Workshop Item PeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/689/1/yasir_honet.pdf Yasir Abdelgadir , Mohamed and Azween, Abdullah (2008) Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks. In: 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies, HONET 2008, 18 November 2008 through 20 November 2008, Penang. |
| spellingShingle | QA75 Electronic computers. Computer science Yasir Abdelgadir , Mohamed Azween, Abdullah Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks |
| title | Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks |
| title_full | Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks |
| title_fullStr | Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks |
| title_full_unstemmed | Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks |
| title_short | Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks |
| title_sort | biologically inspired model for securing hybrid mobile ad hoc networks |
| topic | QA75 Electronic computers. Computer science |
| url | http://scholars.utp.edu.my/id/eprint/689/ http://scholars.utp.edu.my/id/eprint/689/1/yasir_honet.pdf |