An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2020-02
Hauptverfasser: Behzad, Shahram, Fotohi, Reza, Jaber Hosseini Balov, Rabipour, Mohammad Javad
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Behzad, Shahram
Fotohi, Reza
Jaber Hosseini Balov
Rabipour, Mohammad Javad
description MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.
doi_str_mv 10.48550/arxiv.2003.00870
format Article
fullrecord <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2003_00870</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2370245058</sourcerecordid><originalsourceid>FETCH-LOGICAL-a528-10e1c75de7b3104fb5516a9f09b58b6abc42431b2aeffdb9b3d38809c9612c903</originalsourceid><addsrcrecordid>eNotkFFLwzAUhYMgOOZ-gE8GfO68SZo2faxT52Dqy8DHcpOmLFvXziSb-u-tm0-XAx-Hcz9CbhhMUyUl3KP_dscpBxBTAJXDBRlxIViiUs6vyCSEDQDwLOdSihFZlx0tfXSNMw5butjtDp2lDxhsTcv93vdo1rTpPX200Zro-o5iV9NF6Fs8pVcXtF3j0Q1MGSOabaCuox_O29aGQN9s_Or9NlyTywbbYCf_d0xWz0-r2UuyfJ8vZuUyQclVwsAyk8va5lowSBstJcuwaKDQUukMtUl5KpjmaJum1oUWtVAKClNkjJsCxJjcnmtPGqq9dzv0P9WfjuqkYyDuzsTw3OfBhlht-oPvhk0VFznwVIJU4hdfUWMq</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2370245058</pqid></control><display><type>article</type><title>An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks</title><source>arXiv.org</source><source>Free E- Journals</source><creator>Behzad, Shahram ; Fotohi, Reza ; Jaber Hosseini Balov ; Rabipour, Mohammad Javad</creator><creatorcontrib>Behzad, Shahram ; Fotohi, Reza ; Jaber Hosseini Balov ; Rabipour, Mohammad Javad</creatorcontrib><description>MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2003.00870</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Algorithms ; Artificial intelligence ; Computer Science - Cryptography and Security ; Computer Science - Networking and Internet Architecture ; Computer Science - Performance ; Computer simulation ; Immune system ; Mobile ad hoc networks ; Mobile communication systems ; Network topologies ; Nodes ; Packets (communication) ; Radio equipment ; Substructures ; Wireless networks</subject><ispartof>arXiv.org, 2020-02</ispartof><rights>2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,784,885,27925</link.rule.ids><backlink>$$Uhttps://doi.org/10.17706/jcp.13.6.705-720$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.48550/arXiv.2003.00870$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Behzad, Shahram</creatorcontrib><creatorcontrib>Fotohi, Reza</creatorcontrib><creatorcontrib>Jaber Hosseini Balov</creatorcontrib><creatorcontrib>Rabipour, Mohammad Javad</creatorcontrib><title>An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks</title><title>arXiv.org</title><description>MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.</description><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Networking and Internet Architecture</subject><subject>Computer Science - Performance</subject><subject>Computer simulation</subject><subject>Immune system</subject><subject>Mobile ad hoc networks</subject><subject>Mobile communication systems</subject><subject>Network topologies</subject><subject>Nodes</subject><subject>Packets (communication)</subject><subject>Radio equipment</subject><subject>Substructures</subject><subject>Wireless networks</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GOX</sourceid><recordid>eNotkFFLwzAUhYMgOOZ-gE8GfO68SZo2faxT52Dqy8DHcpOmLFvXziSb-u-tm0-XAx-Hcz9CbhhMUyUl3KP_dscpBxBTAJXDBRlxIViiUs6vyCSEDQDwLOdSihFZlx0tfXSNMw5butjtDp2lDxhsTcv93vdo1rTpPX200Zro-o5iV9NF6Fs8pVcXtF3j0Q1MGSOabaCuox_O29aGQN9s_Or9NlyTywbbYCf_d0xWz0-r2UuyfJ8vZuUyQclVwsAyk8va5lowSBstJcuwaKDQUukMtUl5KpjmaJum1oUWtVAKClNkjJsCxJjcnmtPGqq9dzv0P9WfjuqkYyDuzsTw3OfBhlht-oPvhk0VFznwVIJU4hdfUWMq</recordid><startdate>20200224</startdate><enddate>20200224</enddate><creator>Behzad, Shahram</creator><creator>Fotohi, Reza</creator><creator>Jaber Hosseini Balov</creator><creator>Rabipour, Mohammad Javad</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20200224</creationdate><title>An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks</title><author>Behzad, Shahram ; Fotohi, Reza ; Jaber Hosseini Balov ; Rabipour, Mohammad Javad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a528-10e1c75de7b3104fb5516a9f09b58b6abc42431b2aeffdb9b3d38809c9612c903</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Networking and Internet Architecture</topic><topic>Computer Science - Performance</topic><topic>Computer simulation</topic><topic>Immune system</topic><topic>Mobile ad hoc networks</topic><topic>Mobile communication systems</topic><topic>Network topologies</topic><topic>Nodes</topic><topic>Packets (communication)</topic><topic>Radio equipment</topic><topic>Substructures</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Behzad, Shahram</creatorcontrib><creatorcontrib>Fotohi, Reza</creatorcontrib><creatorcontrib>Jaber Hosseini Balov</creatorcontrib><creatorcontrib>Rabipour, Mohammad Javad</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Behzad, Shahram</au><au>Fotohi, Reza</au><au>Jaber Hosseini Balov</au><au>Rabipour, Mohammad Javad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks</atitle><jtitle>arXiv.org</jtitle><date>2020-02-24</date><risdate>2020</risdate><eissn>2331-8422</eissn><abstract>MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2003.00870</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2020-02
issn 2331-8422
language eng
recordid cdi_arxiv_primary_2003_00870
source arXiv.org; Free E- Journals
subjects Algorithms
Artificial intelligence
Computer Science - Cryptography and Security
Computer Science - Networking and Internet Architecture
Computer Science - Performance
Computer simulation
Immune system
Mobile ad hoc networks
Mobile communication systems
Network topologies
Nodes
Packets (communication)
Radio equipment
Substructures
Wireless networks
title An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T12%3A54%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Artificial%20Immune%20Based%20Approach%20for%20Detection%20and%20Isolation%20Misbehavior%20Attacks%20in%20Wireless%20Networks&rft.jtitle=arXiv.org&rft.au=Behzad,%20Shahram&rft.date=2020-02-24&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2003.00870&rft_dat=%3Cproquest_arxiv%3E2370245058%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2370245058&rft_id=info:pmid/&rfr_iscdi=true