MANET: Securing AODV Based on a Combined Immune Theories Algorithm (CITA)

Mobile Ad hoc Networks consist of a set of mobile nodes communicating with each other in a decentralized and dynamic topology where nodes provide retransmission capabilities. Communications between source nodes and destinations go through routes represented by a set of intermediate nodes that are required to adapt and behave in response to some actions according to orders given by the chosen routing protocol. Absence of a centralized architecture, in addition to open wireless medium of Ad hoc networks, as well as nodes mobility are ones of the network characteristics that render the environment much vulnerable to different routing attacks. A wide range of current researches focus on enhancing MANET security using various techniques like cryptography, but these mechanisms creates too much overhead. Artificial Immune Systems provide intrusion detection techniques based on the abstraction of the human immune system. They are known to be very efficient and lightweight algorithms. Multiple immune theories are implemented like Negative selection, Clonal selection, Danger theory, Immune network...etc. This paper proposes the use of combined immune theories as an Intrusion Detection System that integrates to the AODV routing protocol and that can sense the presence of non-trusted nodes, as it can eliminate them from the network. The proposed approach is tested and validated in presence of Packet Dropping Attack. Promising results in terms of network performance then are discussed.

[1]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[2]  Polly Matzinger,et al.  Friendly and dangerous signals: is the tissue in control? , 2007, Nature Immunology.

[3]  Yoshiteru Ishida Immunity-Based Systems: A Design Perspective , 2010 .

[4]  Robert A. Scholtz,et al.  Performance Analysis of , 1998 .

[5]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[7]  Jonathan Timmis Artificial immune systems : a novel data analysis technique inspired by the immune network theory , 2000 .

[8]  P. Matzinger,et al.  An innate sense of danger. , 1998, Seminars in immunology.

[9]  Mark A. Gregory,et al.  A review of artificial immune system based security frameworks for MANET , 2016 .

[10]  Gu Ji-yan,et al.  The Dendritic Cell Algorithm , 2011 .

[11]  Julie Greensmith,et al.  Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.

[12]  Davide Cerri,et al.  Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.

[13]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[14]  Raed A. Alsaqour,et al.  Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET , 2011, ICSECS.

[15]  Mohammed Bouhorma,et al.  A New Approach to Artificial Immune System for Intrusion Detection of the Mobile Ad Hoc Networks , 2014 .

[16]  Maha Abdelhaq,et al.  Detecting Sleep Deprivation Attack over MANET Using a Danger Theory -Based Algorithm , 2011 .

[17]  Senhua Yu,et al.  MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.