A Multiagent Self-healing System against Security Incidents in MANETs

Few proposals exist in the literature where security in networks and communications is studied from a pro-active perspective. One of them is MARS, a self-healing system intended to mitigate the malicious effects of common threats in MANETs. MARS makes use of special agent nodes to recover the loss of connectivity due to the operation of malicious nodes in the environment. Despite the general good performance of MARS, this paper shows some situations in which it does not work properly. This is caused by an inappropriate behavior of the optimization objective function considered in MARS. To overcome this limitation, a couple of alternative functions are designed and evaluated. The effectiveness of the new proposals is validated through extensive experiments. The new optimization functions lead to an increase in the resilience and tolerance of the network against security threats, improving network survivability.

[1]  Kamaljit I. Lakhtaria Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends , 2012 .

[2]  Pedro García-Teodoro,et al.  A Security Response Approach Based on the Deployment of Mobile Agents , 2013, PAAMS.

[3]  Ramjee Prasad,et al.  Effects of malicious attacks in mobile ad-hoc networks , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[4]  Jeffrey S. Smith,et al.  Optimizing tactical military MANETs with a specialized PSO , 2010, IEEE Congress on Evolutionary Computation.

[5]  Farrukh Aslam Khan,et al.  Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Ani Taggu,et al.  TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[7]  Abdullah Konak,et al.  Connectivity management in mobile ad hoc networks using particle swarm optimization , 2011, Ad Hoc Networks.

[8]  Sarmistha Neogy,et al.  Mobile Agent Security in MANET Using Reputation , 2011 .

[9]  Abdul Hanan Abdullah,et al.  A Survey of MANET Survivability Routing Techniques , 2013 .

[10]  Eric Renault,et al.  Advances in Parallel Distributed Computing , 2011 .

[11]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[12]  Yasir Abdelgadir Mohamed,et al.  Immune-inspired framework for securing hybrid MANET , 2009, 2009 IEEE Symposium on Industrial Electronics & Applications.

[13]  Chun-Cheng Lin,et al.  Dynamic router node placement in wireless mesh networks: A PSO approach with constriction coefficient and its convergence analysis , 2013, Inf. Sci..

[14]  Hongbin Zhang,et al.  Research on the survivability based on the algorithms of the key point detection and compensation in Ad Hoc networks , 2013, 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering.

[15]  Goutham Kamath,et al.  Optimal trajectory determination of a single moving beacon for efficient localization in a mobile ad-hoc network , 2013, Ad Hoc Networks.

[16]  Yves Demazeau,et al.  Advances on Practical Applications of Agents and Multi-Agent Systems - 10th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2012, Salamanca, Spain, 28-30 March, 2012 , 2012, Advances in Intelligent and Soft Computing.

[17]  Rituparna Chaki,et al.  Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent , 2011 .

[18]  Paulo Leitão,et al.  Past, Present, and Future of Industrial Agent Applications , 2013, IEEE Transactions on Industrial Informatics.

[19]  Dhinaharan Nagamalai,et al.  Recent Trends in Wireless and Mobile Networks , 2011 .