Cargando…

Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based at...

Descripción completa

Detalles Bibliográficos
Autores principales: Abdelhaq, Maha, Alsaqour, Raed, Abdelhaq, Shawkat
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4422671/
https://www.ncbi.nlm.nih.gov/pubmed/25946001
http://dx.doi.org/10.1371/journal.pone.0120715
_version_ 1782370091118100480
author Abdelhaq, Maha
Alsaqour, Raed
Abdelhaq, Shawkat
author_facet Abdelhaq, Maha
Alsaqour, Raed
Abdelhaq, Shawkat
author_sort Abdelhaq, Maha
collection PubMed
description A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.
format Online
Article
Text
id pubmed-4422671
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-44226712015-05-12 Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm Abdelhaq, Maha Alsaqour, Raed Abdelhaq, Shawkat PLoS One Research Article A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. Public Library of Science 2015-05-06 /pmc/articles/PMC4422671/ /pubmed/25946001 http://dx.doi.org/10.1371/journal.pone.0120715 Text en © 2015 Abdelhaq et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited.
spellingShingle Research Article
Abdelhaq, Maha
Alsaqour, Raed
Abdelhaq, Shawkat
Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
title Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
title_full Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
title_fullStr Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
title_full_unstemmed Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
title_short Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
title_sort securing mobile ad hoc networks using danger theory-based artificial immune algorithm
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4422671/
https://www.ncbi.nlm.nih.gov/pubmed/25946001
http://dx.doi.org/10.1371/journal.pone.0120715
work_keys_str_mv AT abdelhaqmaha securingmobileadhocnetworksusingdangertheorybasedartificialimmunealgorithm
AT alsaqourraed securingmobileadhocnetworksusingdangertheorybasedartificialimmunealgorithm
AT abdelhaqshawkat securingmobileadhocnetworksusingdangertheorybasedartificialimmunealgorithm