Cargando…
Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based at...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4422671/ https://www.ncbi.nlm.nih.gov/pubmed/25946001 http://dx.doi.org/10.1371/journal.pone.0120715 |
_version_ | 1782370091118100480 |
---|---|
author | Abdelhaq, Maha Alsaqour, Raed Abdelhaq, Shawkat |
author_facet | Abdelhaq, Maha Alsaqour, Raed Abdelhaq, Shawkat |
author_sort | Abdelhaq, Maha |
collection | PubMed |
description | A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. |
format | Online Article Text |
id | pubmed-4422671 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-44226712015-05-12 Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm Abdelhaq, Maha Alsaqour, Raed Abdelhaq, Shawkat PLoS One Research Article A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. Public Library of Science 2015-05-06 /pmc/articles/PMC4422671/ /pubmed/25946001 http://dx.doi.org/10.1371/journal.pone.0120715 Text en © 2015 Abdelhaq et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited. |
spellingShingle | Research Article Abdelhaq, Maha Alsaqour, Raed Abdelhaq, Shawkat Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm |
title | Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm |
title_full | Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm |
title_fullStr | Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm |
title_full_unstemmed | Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm |
title_short | Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm |
title_sort | securing mobile ad hoc networks using danger theory-based artificial immune algorithm |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4422671/ https://www.ncbi.nlm.nih.gov/pubmed/25946001 http://dx.doi.org/10.1371/journal.pone.0120715 |
work_keys_str_mv | AT abdelhaqmaha securingmobileadhocnetworksusingdangertheorybasedartificialimmunealgorithm AT alsaqourraed securingmobileadhocnetworksusingdangertheorybasedartificialimmunealgorithm AT abdelhaqshawkat securingmobileadhocnetworksusingdangertheorybasedartificialimmunealgorithm |