An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

by   Shahram Behzad, et al.

MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.


page 1

page 2

page 3

page 4


Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey

A Mobile Ad hoc Network can be said as a collection of mobile nodes, whi...

Detection and Prevention Against RTS Attacks in Wireless LAN

Widely deployed wireless network devices use a shared medium to communic...

Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding Based Peer-to-Peer Live Streaming

Network coding based peer-to-peer streaming represents an effective solu...

Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks

Routing protocols are used to transmit the packets from the source to th...

Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks

We describe a new class of packet injection attacks called Man-on-the-Si...

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network

Coding Opportunistically (COPE) is a simple but very effective data codi...

TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

Wireless Mesh Networks (WMNs) have emerged as a key technology for the n...