{"title":"免疫启发的混合MANET安全框架","authors":"Y. Mohamed, A. Abdullah","doi":"10.1109/ISIEA.2009.5356451","DOIUrl":null,"url":null,"abstract":"A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability environment in each. In a step for providing secured and reliable broadband services, formal specification logic along with a novel Immune-inspired security framework (I2MANETs) have been introduced. The different immune components synchronized to the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the Human Immune System in: first response, second response, adaptability, distributability, survivability and other immune features. The I2MANETs can basically installed in one node in the domain, then automatically spread to the rest of the domain.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"2011 1","pages":"301-306"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Immune-inspired framework for securing hybrid MANET\",\"authors\":\"Y. Mohamed, A. Abdullah\",\"doi\":\"10.1109/ISIEA.2009.5356451\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability environment in each. In a step for providing secured and reliable broadband services, formal specification logic along with a novel Immune-inspired security framework (I2MANETs) have been introduced. The different immune components synchronized to the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the Human Immune System in: first response, second response, adaptability, distributability, survivability and other immune features. The I2MANETs can basically installed in one node in the domain, then automatically spread to the rest of the domain.\",\"PeriodicalId\":6447,\"journal\":{\"name\":\"2009 IEEE Symposium on Industrial Electronics & Applications\",\"volume\":\"2011 1\",\"pages\":\"301-306\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE Symposium on Industrial Electronics & Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIEA.2009.5356451\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE Symposium on Industrial Electronics & Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIEA.2009.5356451","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Immune-inspired framework for securing hybrid MANET
A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability environment in each. In a step for providing secured and reliable broadband services, formal specification logic along with a novel Immune-inspired security framework (I2MANETs) have been introduced. The different immune components synchronized to the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the Human Immune System in: first response, second response, adaptability, distributability, survivability and other immune features. The I2MANETs can basically installed in one node in the domain, then automatically spread to the rest of the domain.