Danger theory and collaborative filtering in MANETs

As more organizations grasp the tremendous benefits of Mobile Ad-hoc Networks (MANETs) in tactical situations such as disaster recovery or battlefields, research has begun to focus on ways to secure such environments. Unfortunately, the very factors that make MANETs effective (fluidity, resilience, and decentralization) pose tremendous challenges for those tasked with securing such environments. Our prior work in the field led to the design of BITSI – the Biologically-Inspired Tactical Security Infrastructure. BITSI implements a simple artificial immune system based upon Danger Theory. This approach moves beyond self/non-self recognition and instead focuses on systemic damage in the form of deviation from mission parameters. In this paper, we briefly review our prior work on BITSI and our simulation environment, and then present the application of collaborative filtering techniques. Our results are encouraging, and show that collaborative filtering significantly improves classification error rate and response within the MANET environment. Finally, we explore the implications of the results for further work in the field, and describe our plans for new research.

[1]  Brian L. Mark,et al.  Robust cooperative trust establishment for MANETs , 2006, SASN '06.

[2]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[3]  Jolyon Clulow,et al.  Suicide for the common good: a new strategy for credential revocation in self-organizing systems , 2006, OPSR.

[4]  P. Matzinger,et al.  Essay 1: The Danger Model in Its Historical Context , 2001, Scandinavian journal of immunology.

[5]  Karl N. Levitt,et al.  A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[6]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[7]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[8]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[9]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[10]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[11]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[12]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[13]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[14]  Jeffrey O. Kephart,et al.  Blueprint for a Computer Immune System , 1999 .

[15]  Richard Ford,et al.  Securing MANETs with BITSI: danger theory and mission continuity , 2008, SPIE Defense + Commercial Sensing.

[16]  Jean-Yves Le Boudec,et al.  An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks , 2005, IEEE Transactions on Neural Networks.