A Security Response Approach Based on the Deployment of Mobile Agents | SpringerLink
Skip to main content

A Security Response Approach Based on the Deployment of Mobile Agents

  • Conference paper
Advances on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2013)

Abstract

This paper introduces a response mechanism to improve the tolerance against security threats in MANET environments. The mechanism is started after detecting the existence of nodes with malicious behavior, and is based on the use of one or more mobile agents to improve the connectivity of the network. This way, in the event of the detection of a malicious node (e.g. a selfish node or a dropper node), an agent is employed to maximize the overall connectivity of the network. Every agent acts as a relaying node within the MANET and it is automatically positioned according to a particle swarm optimization (PSO) process. This paper represents a work in progress. However, the promising results obtained show the good suitability of the approach to improve the survivability of the network from a security perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. Springer, US (2007)

    Google Scholar 

  2. Ehsan, H., Khan, F.A.: Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs. In: Procedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), UK, pp. 1181–1187 (June 2012)

    Google Scholar 

  3. Lima, M., dos Santos, A., Pujolle, G.: A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials 11, 66–77 (2009)

    Article  Google Scholar 

  4. Dengiz, O., Konak, A., Smith, A.E.: Connectivity management in mobile ad hoc networks using particle swarm optimization. Ad Hoc Networks 9, 1312–1326 (2011)

    Article  Google Scholar 

  5. Cho, Y., Smith, J.S., Smith, A.E.: Optimizing tactical military MANETs with a specialized PSO. In: 2010 IEEE Congress on Evolutionary Computation (CEC), pp. 1–6. IEEE (2010)

    Google Scholar 

  6. Miles, J., Kamath, G., Muknahallipatna, S., Stefanovic, M., Kubichek, R.F.: Optimal trajectory determination of a single moving beacon for efficient localization in a mobile ad-hoc network. Ad Hoc Networks (2012)

    Google Scholar 

  7. Asadinia, S., Rafsanjani, M.K., Saeid, A.B.: A novel routing algorithm based-on ant colony in Mobile Ad hoc Networks. In: 2010 3rd IEEE International Conference on Ubi-media Computing (U-Media), pp. 77–82. IEEE (2010)

    Google Scholar 

  8. Daniel, A.K., Singh, R.: Swarm Intelligence Based multicast Routing and Bandwidth Management protocol for Ad-hoc wireless Network Using Backpressure Restoration. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol. 5, pp. 516–520. IEEE (2010)

    Google Scholar 

  9. Fahmy, I.M.A., Hefny, H.A., Nassef, L.: PEEBR: Predictive Energy Efficient Bee Routing algorithm for Ad-hoc wireless mobile networks. In: 2012 8th International Conference on Informatics and Systems (INFOS), pp. NW-18–NW-24. IEEE (2012)

    Google Scholar 

  10. Taggu, A., Taggu, A.: An application-layer scheme for intrusion detection in MANET using mobile agents. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–4. IEEE (2011)

    Google Scholar 

  11. Roy, D.B., Chaki, R.: Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent. In: Özcan, A., Zizka, J., Nagamalai, D. (eds.) WiMo/CoNeCo 2011. CCIS, vol. 162, pp. 14–23. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Mohamed, Y.A., Abdullah, A.B.: Immune-inspired framework for securing hybrid MANET. In: IEEE Symposium on Industrial Electronics Applications, ISIEA 2009, vol. 1, pp. 301–306. IEEE (2009)

    Google Scholar 

  13. Ye, X., Li, J.: A security architecture based on immune agents for MANET. In: International Conference on Wireless Communication and Sensor Computing, ICWCSC 2010, pp. 1–5. IEEE (2010)

    Google Scholar 

  14. Halim, I.T.A., Fahmy, H.M.A., Bahaa El-Din, A.M., El-Shafey, M.H.: Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks. In: 2010 4th International Conference on Network and System Security (NSS), pp. 255–262. IEEE (2010)

    Google Scholar 

  15. Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, Nagoya, pp. 39–43 (1995)

    Google Scholar 

  16. Sánchez-Casado, L., Maciá-Fernández, G., García-Teodoro, P.: An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs. In: Procedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), UK, pp. 231–238 (June 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Magán-Carrión, R., Camacho-Páez, J., García-Teodoro, P. (2013). A Security Response Approach Based on the Deployment of Mobile Agents. In: Demazeau, Y., Ishida, T., Corchado, J.M., Bajo, J. (eds) Advances on Practical Applications of Agents and Multi-Agent Systems. PAAMS 2013. Lecture Notes in Computer Science(), vol 7879. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38073-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38073-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38072-3

  • Online ISBN: 978-3-642-38073-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics