REVIEW OF ARTIFICIAL IMMUNE SYSTEM TO ENHANCE SECURITY IN MOBILE AD-HOC SYSTEMS
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 2
Abstract
Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not fixed in a Mobile Adhoc Network; due to host mobility topology can change any time. Mobile Ad-hoc Networks are much more vulnerable to security attacks. Current research works on securing Mobile Adhoc Networks mainly focus on confidentiality, integrity,authentication, availability, and fairness. Design of routing protocols is very much crucial in Mobile Ad-hoc Network.There are various techniques for securing Mobile Ad-hoc Network i.e. cryptography. Cryptography provides efficient mechanism to provide security, but it creates very much overhead. So, an approach is used which is analogous to Biological Immune System, known as Artificial Immune System(AIS). There is a reason of AIS to be used for security purposes because the Human Immune System (HIS) protects the body against damage from an extremely large number of harmful bacteria, viruses, parasites and fungi, termed pathogens. It does this largely without prior knowledge of the structure of these pathogens. AIS provide security by determining non-trusted nodes and eliminate all non-trusted nodes from the network.
Authors and Affiliations
TARUN DALAL, GOPAL SINGH
Impact of Foreign Direct Investment on Retail Industry of the Indian Economy
The Indian retail sector, particularly organized retail, is still under-developed and in a nascent stage and that, therefore, it is important that the domestic retail sector is allowed to grow and consolidate first, befo...
An Improved Approach to perform Crawling and avoid Duplicate Web Pages
When a web search is performed it includes many duplicate web pages or the websites. It means we can get number of similar pages at different web servers. We are proposing a Web Crawling Approach to Detect and avoid Dupl...
Analysis of the Protected Extensible Authentication Protocol
The Internet Engineering Task Force (IETF) has proposed new protocols for highly secured wireless networking. The purpose of this paper is to implement one such proposed security protocol - PEAP (Protected Extensible Aut...
LDPC CODED ADVANCED COMMUNICATION SYSTEM WITH IMPROVED PAPR
In this paper LDPC coded communication system are proposed using MATLAB to provide excellent error performance under extreme noisy channel conditions of different data rate applications with suitable modulation schemes a...
An Implementation of Advanced Traffic Control Techniques in MANET
Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network (MANET) is a self-configuring network of mobil...