Abstract
This paper introduces a response mechanism to improve the tolerance against security threats in MANET environments. The mechanism is started after detecting the existence of nodes with malicious behavior, and is based on the use of one or more mobile agents to improve the connectivity of the network. This way, in the event of the detection of a malicious node (e.g. a selfish node or a dropper node), an agent is employed to maximize the overall connectivity of the network. Every agent acts as a relaying node within the MANET and it is automatically positioned according to a particle swarm optimization (PSO) process. This paper represents a work in progress. However, the promising results obtained show the good suitability of the approach to improve the survivability of the network from a security perspective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. Springer, US (2007)
Ehsan, H., Khan, F.A.: Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs. In: Procedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), UK, pp. 1181–1187 (June 2012)
Lima, M., dos Santos, A., Pujolle, G.: A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials 11, 66–77 (2009)
Dengiz, O., Konak, A., Smith, A.E.: Connectivity management in mobile ad hoc networks using particle swarm optimization. Ad Hoc Networks 9, 1312–1326 (2011)
Cho, Y., Smith, J.S., Smith, A.E.: Optimizing tactical military MANETs with a specialized PSO. In: 2010 IEEE Congress on Evolutionary Computation (CEC), pp. 1–6. IEEE (2010)
Miles, J., Kamath, G., Muknahallipatna, S., Stefanovic, M., Kubichek, R.F.: Optimal trajectory determination of a single moving beacon for efficient localization in a mobile ad-hoc network. Ad Hoc Networks (2012)
Asadinia, S., Rafsanjani, M.K., Saeid, A.B.: A novel routing algorithm based-on ant colony in Mobile Ad hoc Networks. In: 2010 3rd IEEE International Conference on Ubi-media Computing (U-Media), pp. 77–82. IEEE (2010)
Daniel, A.K., Singh, R.: Swarm Intelligence Based multicast Routing and Bandwidth Management protocol for Ad-hoc wireless Network Using Backpressure Restoration. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol. 5, pp. 516–520. IEEE (2010)
Fahmy, I.M.A., Hefny, H.A., Nassef, L.: PEEBR: Predictive Energy Efficient Bee Routing algorithm for Ad-hoc wireless mobile networks. In: 2012 8th International Conference on Informatics and Systems (INFOS), pp. NW-18–NW-24. IEEE (2012)
Taggu, A., Taggu, A.: An application-layer scheme for intrusion detection in MANET using mobile agents. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–4. IEEE (2011)
Roy, D.B., Chaki, R.: Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent. In: Özcan, A., Zizka, J., Nagamalai, D. (eds.) WiMo/CoNeCo 2011. CCIS, vol. 162, pp. 14–23. Springer, Heidelberg (2011)
Mohamed, Y.A., Abdullah, A.B.: Immune-inspired framework for securing hybrid MANET. In: IEEE Symposium on Industrial Electronics Applications, ISIEA 2009, vol. 1, pp. 301–306. IEEE (2009)
Ye, X., Li, J.: A security architecture based on immune agents for MANET. In: International Conference on Wireless Communication and Sensor Computing, ICWCSC 2010, pp. 1–5. IEEE (2010)
Halim, I.T.A., Fahmy, H.M.A., Bahaa El-Din, A.M., El-Shafey, M.H.: Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks. In: 2010 4th International Conference on Network and System Security (NSS), pp. 255–262. IEEE (2010)
Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, Nagoya, pp. 39–43 (1995)
Sánchez-Casado, L., Maciá-Fernández, G., García-Teodoro, P.: An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs. In: Procedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), UK, pp. 231–238 (June 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Magán-Carrión, R., Camacho-Páez, J., García-Teodoro, P. (2013). A Security Response Approach Based on the Deployment of Mobile Agents. In: Demazeau, Y., Ishida, T., Corchado, J.M., Bajo, J. (eds) Advances on Practical Applications of Agents and Multi-Agent Systems. PAAMS 2013. Lecture Notes in Computer Science(), vol 7879. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38073-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-38073-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38072-3
Online ISBN: 978-3-642-38073-0
eBook Packages: Computer ScienceComputer Science (R0)