SECURITY MECHANISM FOR MANETS

Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastruct...

Full description

Bibliographic Details
Main Authors: YASIR ABDELGADIR MOHAMED, AZWEEN B. ABDULLAH
Format: Article
Language:English
Published: Taylor's University 2009-06-01
Series:Journal of Engineering Science and Technology
Subjects:
Online Access:http://jestec.taylors.edu.my/Vol%204%20Issue%202%20June%2009/Vol_4_2_231-242_YASIR%20ABDELGADIR%20MOHAMED.pdf
id doaj-9cfa90dcca2040aaa7f85864176cb2fd
record_format Article
spelling doaj-9cfa90dcca2040aaa7f85864176cb2fd2020-11-24T23:39:39ZengTaylor's UniversityJournal of Engineering Science and Technology1823-46902009-06-0142231242SECURITY MECHANISM FOR MANETSYASIR ABDELGADIR MOHAMEDAZWEEN B. ABDULLAHBe short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available. Forwarding packets or participating in routing process, either of each can directly affect the network security state. Nevertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks. Even though immune-inspired approaches aren’t essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multi-agent paradigm is presented. Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility.http://jestec.taylors.edu.my/Vol%204%20Issue%202%20June%2009/Vol_4_2_231-242_YASIR%20ABDELGADIR%20MOHAMED.pdfImmune systemArchitectureSecurityMobile ad hoc networks
collection DOAJ
language English
format Article
sources DOAJ
author YASIR ABDELGADIR MOHAMED
AZWEEN B. ABDULLAH
spellingShingle YASIR ABDELGADIR MOHAMED
AZWEEN B. ABDULLAH
SECURITY MECHANISM FOR MANETS
Journal of Engineering Science and Technology
Immune system
Architecture
Security
Mobile ad hoc networks
author_facet YASIR ABDELGADIR MOHAMED
AZWEEN B. ABDULLAH
author_sort YASIR ABDELGADIR MOHAMED
title SECURITY MECHANISM FOR MANETS
title_short SECURITY MECHANISM FOR MANETS
title_full SECURITY MECHANISM FOR MANETS
title_fullStr SECURITY MECHANISM FOR MANETS
title_full_unstemmed SECURITY MECHANISM FOR MANETS
title_sort security mechanism for manets
publisher Taylor's University
series Journal of Engineering Science and Technology
issn 1823-4690
publishDate 2009-06-01
description Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available. Forwarding packets or participating in routing process, either of each can directly affect the network security state. Nevertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks. Even though immune-inspired approaches aren’t essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multi-agent paradigm is presented. Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility.
topic Immune system
Architecture
Security
Mobile ad hoc networks
url http://jestec.taylors.edu.my/Vol%204%20Issue%202%20June%2009/Vol_4_2_231-242_YASIR%20ABDELGADIR%20MOHAMED.pdf
work_keys_str_mv AT yasirabdelgadirmohamed securitymechanismformanets
AT azweenbabdullah securitymechanismformanets
_version_ 1725512467485818880