REVIEW OF ARTIFICIAL IMMUNE SYSTEM TO ENHANCE SECURITY IN MOBILE AD-HOC SYSTEMS
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 2
Abstract
Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not fixed in a Mobile Adhoc Network; due to host mobility topology can change any time. Mobile Ad-hoc Networks are much more vulnerable to security attacks. Current research works on securing Mobile Adhoc Networks mainly focus on confidentiality, integrity,authentication, availability, and fairness. Design of routing protocols is very much crucial in Mobile Ad-hoc Network.There are various techniques for securing Mobile Ad-hoc Network i.e. cryptography. Cryptography provides efficient mechanism to provide security, but it creates very much overhead. So, an approach is used which is analogous to Biological Immune System, known as Artificial Immune System(AIS). There is a reason of AIS to be used for security purposes because the Human Immune System (HIS) protects the body against damage from an extremely large number of harmful bacteria, viruses, parasites and fungi, termed pathogens. It does this largely without prior knowledge of the structure of these pathogens. AIS provide security by determining non-trusted nodes and eliminate all non-trusted nodes from the network.
Authors and Affiliations
TARUN DALAL, GOPAL SINGH
CONCURRENT ENGINEERING FOR PROCESS IMPROVEMENT OF PRODUCT
Nowadays the competition among companies is so compelling that they should not only be on the top of technology in the area, but also run their business according to life-long models. The emphasis on the product post-sal...
Biometric Authentication System based on Iris Patterns
In the present age of digital impersonation, biometric techniques are being used increasingly to prevaricate against identity thefts. Iris recognition is a proven, accurate means to identify people. Iris is regarded as t...
Cost prediction using Neural Network Learning Techniques
The continuous hardware and software development, jointly with the world economical interaction phenomenon has contributed to the competitiveness increase between producing and delivering companies of software product an...
A New Model Using Auction Oriented Approach in Grid Computing
Grids are emerging as the infrastructure for next generation computing. The resources in the Grid are heterogeneous and geographically distributed. The management of resources in such a large and distributed environment...
EMPIRICAL COMPARISON & ANALYSIS OF SHUFFLE EXCHANGE NETWORK AND ITS VARIANTS
Shuffle-exchange networks (SENs) have been widely considered as practical interconnection systems due to their size of its switching elements (SEs) and uncomplicated configuration. SEN is a network among a large cl...