each decision agent can make a judge independently.
This is desirable because the system should be
scalable to very large networks.
6 CONCLUSIONS AND FUTURE
DIRECTIONS
We propose the immunity-based security
architecture for mobile ad hoc networks. Inspired by
immune system, we compare mobile ad hoc
networks to body and invaders as pathogens. Mobile
agents corresponded to lymphocytes detect and
isolate the invader. Just as immune system, our
architecture owns some advantages, such as
distributability, autonomy, adaptability and so on.
In future, we will develop the architecture in two
directions. Firstly, we have designed an efficient
algorithm to find the invader behaviour(Ping Yi,
2005). Secondly when an invader is found, killer
agents want to surround and isolated it. How killer
agents quickly move to the neighbour node of the
invader and surround it is also our further work.
REFERENCES
S. Corson, J. Macker, 1999, Mobile ad hoc networking
(MANET): Routing protocol performance issues and
evaluation considerations, RFC 2501, January 1999
Srdjan Capkun, Levente Nuttyan, Jean-Pierre Hubaux,
2003, Self-organized public-key management for
mobile ad hoc networks, IEEE Transactions on Mobile
Computing, 2(2003)1, 52-64
Lidong Zhou, Zygmunt J. Haas, 1999,
Securing ad hoc
networks
, IEEE Networks Special Issue on Network
Security, 13(1999)6, 24-30
P.Papadimitratos, Z.Haas, 2002, Secure routing for mobile
ad hoc networks, in Proceedings of the SCS
communication Networks and Distributed Systems
Modeling and Simulation Conference, San Antonio,
TX, January 27-31,2002
Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2002,
Ariadne: A secure on-demand routing protocol for ad
hoc networks
, in Proceedings of the MobiCom 2002,
Atlanta, Georgia, USA, September 23-28, 2002, 12-23
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay
Shields, Elizabeth M. Belding-Royer, 2002,
A secure
routing protocol for ad hoc networks, in Proceedings
of 2002 IEEE International Conference on Network
Protocols (ICNP), Paris, France, November 12-15,
2002, 78-86
Yih-Chun Hu, David B. Johnson, and Adrian Perrig, 2002,
SEAD: Secure efficient distance vector routing for
mobile wireless ad hoc networks
, in Proceedings of
the 4th IEEE Workshop on Mobile Computing
Systems & Applications (WMCSA 2002), Calicoon,
NY, June 2002, 3-13
Yongguang Zhang, Wenke Lee, 2003, Intrusion Detection
Techniques for Mobile Wireless Networks, Wireless
Networks, 9(2003)5, 545-556
S. Forrest, S. Hofmeyr, and A. Somayaji, 1997, Computer
Immunology, Communications of the ACM,
40(1997)10, 88-96
S.Hofmeyr , S.Forrest , 1999, Immunity by design: An
artificial immune system, In Proceedings of the
Genetic and Evolutionary Computation Conference
(GECCO), Morgan-Kaufmann, San Francisco, CA,
1999, 1289-1296
S. Hofmeyr, S. Forrest, 2000, Architecture for an artificial
immune system, Evolutionary Computation Journal
8(2000)4, 443-473
S. Forrest, A.S. Perelson, L. Allen, R. Cherukuri, 1994,
Self-nonself discrimination in a computer, In
Proceedings of the 1994 IEEE Symposium on
Security and Privacy, Oakland, CA, May 16 - 18,
1994, 202-214
J.Kim, P. J.Bentley, 1999,
Negative selection and niching
by an artificial immune system for network intrusion
detection
, Genetic and Evolutionary Computation
Conference (GECCO '99), Orlando, Florida, July 13-
17,1999,149-158
Dipankar Dasgupta, 1999, Immunity-based intrusion
detection systems: A general framework, In the
proceedings of the 22nd National Information Systems
Security Conference (NISSC), Arlington, Virginia,
USA, October 18-21, 1999,147-160
Ping Yi, Yichuan Jiang , Yiping Zhong, Shiyong Zhang,
2005, Distributed Intrusion Detection for mobile ad
hoc networks, The 2005 International Symposium on
Applications and the Internet (SAINT2005), Trento,
Italy, January 31 - February 4, 2005
ICEIS 2005 - SOFTWARE AGENTS AND INTERNET COMPUTING
226