An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks
MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting th...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2020-02 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Behzad, Shahram Fotohi, Reza Jaber Hosseini Balov Rabipour, Mohammad Javad |
description | MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio. |
doi_str_mv | 10.48550/arxiv.2003.00870 |
format | Article |
fullrecord | <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2003_00870</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2370245058</sourcerecordid><originalsourceid>FETCH-LOGICAL-a528-10e1c75de7b3104fb5516a9f09b58b6abc42431b2aeffdb9b3d38809c9612c903</originalsourceid><addsrcrecordid>eNotkFFLwzAUhYMgOOZ-gE8GfO68SZo2faxT52Dqy8DHcpOmLFvXziSb-u-tm0-XAx-Hcz9CbhhMUyUl3KP_dscpBxBTAJXDBRlxIViiUs6vyCSEDQDwLOdSihFZlx0tfXSNMw5butjtDp2lDxhsTcv93vdo1rTpPX200Zro-o5iV9NF6Fs8pVcXtF3j0Q1MGSOabaCuox_O29aGQN9s_Or9NlyTywbbYCf_d0xWz0-r2UuyfJ8vZuUyQclVwsAyk8va5lowSBstJcuwaKDQUukMtUl5KpjmaJum1oUWtVAKClNkjJsCxJjcnmtPGqq9dzv0P9WfjuqkYyDuzsTw3OfBhlht-oPvhk0VFznwVIJU4hdfUWMq</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2370245058</pqid></control><display><type>article</type><title>An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks</title><source>arXiv.org</source><source>Free E- Journals</source><creator>Behzad, Shahram ; Fotohi, Reza ; Jaber Hosseini Balov ; Rabipour, Mohammad Javad</creator><creatorcontrib>Behzad, Shahram ; Fotohi, Reza ; Jaber Hosseini Balov ; Rabipour, Mohammad Javad</creatorcontrib><description>MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2003.00870</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Algorithms ; Artificial intelligence ; Computer Science - Cryptography and Security ; Computer Science - Networking and Internet Architecture ; Computer Science - Performance ; Computer simulation ; Immune system ; Mobile ad hoc networks ; Mobile communication systems ; Network topologies ; Nodes ; Packets (communication) ; Radio equipment ; Substructures ; Wireless networks</subject><ispartof>arXiv.org, 2020-02</ispartof><rights>2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,784,885,27925</link.rule.ids><backlink>$$Uhttps://doi.org/10.17706/jcp.13.6.705-720$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.48550/arXiv.2003.00870$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Behzad, Shahram</creatorcontrib><creatorcontrib>Fotohi, Reza</creatorcontrib><creatorcontrib>Jaber Hosseini Balov</creatorcontrib><creatorcontrib>Rabipour, Mohammad Javad</creatorcontrib><title>An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks</title><title>arXiv.org</title><description>MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.</description><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Networking and Internet Architecture</subject><subject>Computer Science - Performance</subject><subject>Computer simulation</subject><subject>Immune system</subject><subject>Mobile ad hoc networks</subject><subject>Mobile communication systems</subject><subject>Network topologies</subject><subject>Nodes</subject><subject>Packets (communication)</subject><subject>Radio equipment</subject><subject>Substructures</subject><subject>Wireless networks</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GOX</sourceid><recordid>eNotkFFLwzAUhYMgOOZ-gE8GfO68SZo2faxT52Dqy8DHcpOmLFvXziSb-u-tm0-XAx-Hcz9CbhhMUyUl3KP_dscpBxBTAJXDBRlxIViiUs6vyCSEDQDwLOdSihFZlx0tfXSNMw5butjtDp2lDxhsTcv93vdo1rTpPX200Zro-o5iV9NF6Fs8pVcXtF3j0Q1MGSOabaCuox_O29aGQN9s_Or9NlyTywbbYCf_d0xWz0-r2UuyfJ8vZuUyQclVwsAyk8va5lowSBstJcuwaKDQUukMtUl5KpjmaJum1oUWtVAKClNkjJsCxJjcnmtPGqq9dzv0P9WfjuqkYyDuzsTw3OfBhlht-oPvhk0VFznwVIJU4hdfUWMq</recordid><startdate>20200224</startdate><enddate>20200224</enddate><creator>Behzad, Shahram</creator><creator>Fotohi, Reza</creator><creator>Jaber Hosseini Balov</creator><creator>Rabipour, Mohammad Javad</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20200224</creationdate><title>An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks</title><author>Behzad, Shahram ; Fotohi, Reza ; Jaber Hosseini Balov ; Rabipour, Mohammad Javad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a528-10e1c75de7b3104fb5516a9f09b58b6abc42431b2aeffdb9b3d38809c9612c903</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Networking and Internet Architecture</topic><topic>Computer Science - Performance</topic><topic>Computer simulation</topic><topic>Immune system</topic><topic>Mobile ad hoc networks</topic><topic>Mobile communication systems</topic><topic>Network topologies</topic><topic>Nodes</topic><topic>Packets (communication)</topic><topic>Radio equipment</topic><topic>Substructures</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Behzad, Shahram</creatorcontrib><creatorcontrib>Fotohi, Reza</creatorcontrib><creatorcontrib>Jaber Hosseini Balov</creatorcontrib><creatorcontrib>Rabipour, Mohammad Javad</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Behzad, Shahram</au><au>Fotohi, Reza</au><au>Jaber Hosseini Balov</au><au>Rabipour, Mohammad Javad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks</atitle><jtitle>arXiv.org</jtitle><date>2020-02-24</date><risdate>2020</risdate><eissn>2331-8422</eissn><abstract>MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2003.00870</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2020-02 |
issn | 2331-8422 |
language | eng |
recordid | cdi_arxiv_primary_2003_00870 |
source | arXiv.org; Free E- Journals |
subjects | Algorithms Artificial intelligence Computer Science - Cryptography and Security Computer Science - Networking and Internet Architecture Computer Science - Performance Computer simulation Immune system Mobile ad hoc networks Mobile communication systems Network topologies Nodes Packets (communication) Radio equipment Substructures Wireless networks |
title | An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T12%3A54%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Artificial%20Immune%20Based%20Approach%20for%20Detection%20and%20Isolation%20Misbehavior%20Attacks%20in%20Wireless%20Networks&rft.jtitle=arXiv.org&rft.au=Behzad,%20Shahram&rft.date=2020-02-24&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2003.00870&rft_dat=%3Cproquest_arxiv%3E2370245058%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2370245058&rft_id=info:pmid/&rfr_iscdi=true |