A biologically-inspired type-2 fuzzy set based algorithm for detecting misbehaving nodes in ad-hoc wireless networks

Implementation of routing protocols in mobile adhoc networks relies on efficient node cooperation. However, node misbehavior is a common phenomenon, thus, ad-hoc networks are subject to packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. In this paper, a biologically-inspired type-2 fuzzy set recognition algorithm for detecting misbehaving nodes in an ad-hoc wireless network is presented. Such algorithm, inspired by danger theory and antigen presenting cells, would be implemented in an Artificial Immune System (AIS) for detecting misbehaving nodes without human intervention.

[1]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[2]  Jerry M. Mendel,et al.  Centroid of a type-2 fuzzy set , 2001, Inf. Sci..

[3]  Jerry M. Mendel,et al.  Uncertainty bounds and their use in the design of interval type-2 fuzzy logic systems , 2002, IEEE Trans. Fuzzy Syst..

[4]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[5]  Gerold Schuler,et al.  Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? , 2002, Trends in immunology.

[6]  Hooman Tahayori,et al.  Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[7]  Julie Greensmith,et al.  Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory , 2010, ArXiv.

[8]  Julie Greensmith,et al.  Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.

[9]  Jerry M. Mendel,et al.  Computing with words and its relationships with fuzzistics , 2007, Inf. Sci..

[10]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.

[11]  J. Davies,et al.  Molecular Biology of the Cell , 1983, Bristol Medico-Chirurgical Journal.

[12]  J. Mendel Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions , 2001 .

[13]  Jean-Yves Le Boudec,et al.  An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..

[14]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  Hooman Tahayori,et al.  Distributed-interval type-2 fuzzy set based recognition algorithm for IDS , 2008, 2008 IEEE International Conference on Granular Computing.

[17]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[18]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[19]  Paul P Wang Information Sciences 2007 , 2007 .

[20]  Fabio A. González,et al.  An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[21]  Uwe Aickelin,et al.  Cooperative Automated Worm Response and Detection Immune Algorithm , 2005 .

[22]  Jonatan Gómez,et al.  Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .