2016
DOI: 10.4236/ijcns.2016.91001
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Artificial Immune System Based Security Frameworks for MANET

Abstract: Mobile ad hoc networks (MANETs) are collections of wireless mobile devices that form a communication network with restricted broadcast range, limited resources and without fixed infrastructure. Routing is a critical function in multi-hop MANETs. At the same time, security in MANETsespecially routing security-presents a number of new and interesting challenges. Communication is achieved by relaying data along routes that are dynamically discovered and maintained through collaboration between the nodes. Advances… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 53 publications
0
4
0
Order By: Relevance
“…For anomaly detection in HIDS, identification of unknown attacks by an AIS can be combined with either EA [32], which evolves memory cells for secondary responses, or with fuzzy rules [111]. A review of AIS applications in MANET security can be found in [59].…”
Section: Artificial Immune Systemsmentioning
confidence: 99%
“…For anomaly detection in HIDS, identification of unknown attacks by an AIS can be combined with either EA [32], which evolves memory cells for secondary responses, or with fuzzy rules [111]. A review of AIS applications in MANET security can be found in [59].…”
Section: Artificial Immune Systemsmentioning
confidence: 99%
“…AIS approach is applied to several applications [13], it aims at solving complex computational or engineering problems such as pattern recognition [10,15,16,19,24,33,72] computer virus detection and elimination [27,67], and optimization [28].…”
Section: Artificial Immune Systems For Handwritten Recognitionmentioning
confidence: 99%
“…However these researches are still immature, under development, and not yet effectively exploited in the industry. Jim & al have reviewed most of the immune inspired algorithms and their use in mobile ad hoc networks [13]. Ishida [14] as well reviewed diverse immune network models and discussed the benefits of each approach.…”
Section: Danger Theory and Dendritic Cell Algorithmmentioning
confidence: 99%