HU Yiqing, XIONG Yan, LU Qiwei, GONG Xudong, HUANG Wenchao. A Secure Adaptive Routing Strategy Using Immune Mechanism in MANET[J]. Chinese Journal of Electronics, 2013, 22(4): 784-788.
Citation: HU Yiqing, XIONG Yan, LU Qiwei, GONG Xudong, HUANG Wenchao. A Secure Adaptive Routing Strategy Using Immune Mechanism in MANET[J]. Chinese Journal of Electronics, 2013, 22(4): 784-788.

A Secure Adaptive Routing Strategy Using Immune Mechanism in MANET

Funds:  This work is supported in part by the National Natural Science Foundation of China (No.61170233, No.61232018, No.61272472, No.61202404) and China Postdoctoral Science Foundation (No.2011M501060).
More Information
  • Corresponding author: HU Yiqing, XIONG Yan, LU Qiwei
  • Received Date: 2012-08-01
  • Rev Recd Date: 2012-09-01
  • Publish Date: 2013-09-25
  • Many protocols have been proposed to increase efficiency and security of traditional protocols in Mobile ad-hoc networks (MANET), but they are all facing the problem of computation overhead which leads to impracticability. Adaptive routing strategy (ARS) is a novel routing strategy that switches routing protocol according to the network condition. Though this method alleviates the problem of efficiency, it doesn't cover the secure issues. We integrate our security mechanism based on Artificial immune system (AIS), with adaptive routing strategy to enhance efficiency and security. First we presented a more appropriate definition to the measurement of network condition, then we designed a secure adaptive routing strategy based on the definition. At last, we gave a performance analysis to validate the correctness and reliability of our scheme.
  • loading
  • S. Giordano, “Mobile ad hoc networks”, Handbook of WirelessN etworks and Mobile computing, pp.325-346, 2002.
    N. Asokan, V. Niemi and K.Nyberg, “Man-in-the-middle int unelled authentication protocols”, Security Protocols, Springer,p p.28-41, 2005.
    Y.C. Hu, A. Perrig and D.B. Johnson, “Packet leashes: A defensea gainst wormhole attacks in wireless networks”, Twenty-S econd Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003, Vol.3, pp.1976-1986, 2003.
    A.D. Wood and J.A. Stankovie, “Denial of service in sensorn etworks”, Computer, Vol.35, No.10, pp.54-62, 2002.
    K.M. Kimery and M. McCord, “Third-party assurances: Ther oad to trust in online retailing”, Proceedings of the 35th AnnualH awaii International Conference on System Sciences, IEEE,p p.10-15, 2002.
    P.Devanbu, M. Gertz, C. Martec third-party data publication”,D ata and Application Security, Vol.73, pp.101-112, 2002.
    M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized trust management”,1 996 IEEE Symposium on Security and Privacy,I EEE, pp.164-173, 1996.
    D. Wallner, E. Harde and R. Agee, “Key management for multicast:I ssues and architectures”, Tech. Rep., RF C2627, 1999.
    M. Waldvogel, G. Caronni, D. Sun, N. Weiler and B. Plattner,“The versakey framework: Versatile group key management”,I EEE Journal on Selected Areas in Communications, Vol.17,N o.9, pp.1614-1631, 1999.
    S. Rafaeli and D. Hutchison, “A survey of key managementf or secure group communication”, ACM Computing Surveys( CSUR), Vol.35, No.3, pp.309-329, 2003.
    V. Manfredi, M. Crovella and J. Kurose, “Understanding statefulv s stateless communication strategies for ad hoc networks”, Proceedings of the 17th Annual International Conference onM obile Computing and Networking, ACM, pp.313-324, 2011.
    C.E. Perkins and E.M. Royer, “Ad-hoc on-demand distancev ector routing”, Second IEEE Workshop on Mobile ComputingS ystems and Applications (WMCSA'99), pp.90-100, 1990.
    S. Jain, K, Fall and R. Patra, “Routing in a delay tolerantn etwork”, SIGCOMM Comput. Commun. Rev., Vol.34, No.4,p p.145-158, 2004.
    C.Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn,J . Rowe and K. Levitt, “A specification-based intrusion detections ystem for aodv”, Proceedings of the 1st ACM Workshopo n Security of ad hoc and Sensor Networks, ACM, New York,N Y, USA, pp.125-134, 2003.
    W. Huang, Y. Xiong and D. Chen, “Daaodv: A secure ad hocr outing protocol based on direct anonymous attestation”, International Conference on Computational Science and Engineering, Vancourer, BC, Canada, Vol.2, pp.809-816, IEEE, 2009.
    R. Perez, R. Sailer and L. Van Doorn, “Vtpm: Virtualizingt he trusted platform module”, Conference on USENIX Security Symposium, Vanouver, B.C. Canada, pp.305-320, 2006.
    A. Katem G. Zaverucha and U. Hengartner, “Anonymity ands ecurity in delay tolerant network”, Third International Conferenceo n Security and Privacy in Communications Networks and the Workshops, Nice, France, pp.504-513, 2007.
    J.Y. Le Boudec and S. Sarafijanović, “An artificial immune systema pproach to misbehaior detection in mobile ad hoc networks”,B iologically Inspired Approaches to Advanced InformationT echnology, Vol.3141, pp.396-411, 2004.
    S. Sarafijanovic and J.Y. Le Boudec, “An artificial immune systema pproach with secondary response for misbehavior detection in mobile ad hoc networks”, IEEE Transacrions on NeuralN etworks, Vol.16, No.5, pp.1076-1087, 2005.
    Y. Gu, A. McCallum and D. Towsley, “Detecting anomalies inn etwork traffic using maximum entropy estimation”, Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement,U SENIX Association, pp.32-36, 2005.
    N. Mazhar and M. Farooq, “A sense of danger: Dendritic cellsi nspired artificial immune system for manet security”, Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation, ACM, pp.63-70, 2008.
    J. Kim and P.J. Bentley, “Towards an artificial immune systemf or network intrusion detection: An investigation of clonal selectionw ith a negative selection operator”, Proceedings of the 2001 Congress on Evolutionary Computation, IEEE, Vol.2, pp.1244-1252, 2001.
    S. McCanne and S. Floyd, “Ns network simulator”, 1995.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (279) PDF downloads(1095) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return