Skip to main content

Abstract

Few proposals exist in the literature where security in networks and communications is studied from a pro-active perspective. One of them is MARS, a self-healing system intended to mitigate the malicious effects of common threats in MANETs. MARS makes use of special agent nodes to recover the loss of connectivity due to the operation of malicious nodes in the environment. Despite the general good performance of MARS, this paper shows some situations in which it does not work properly. This is caused by an inappropriate behavior of the optimization objective function considered in MARS. To overcome this limitation, a couple of alternative functions are designed and evaluated. The effectiveness of the new proposals is validated through extensive experiments. The new optimization functions lead to an increase in the resilience and tolerance of the network against security threats, improving network survivability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lakhtaria, K.I., Lakhtaria, K.I.: Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends, 1st edn. IGI Global, Hershey (2012)

    Book  Google Scholar 

  2. Ehsan, H., Khan, F.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1181–1187 (2012)

    Google Scholar 

  3. Kanthe, A., Simunic, D., Prasad, R.: Effects of malicious attacks in mobile ad-hoc networks. In: 2012 IEEE International Conference on Computational Intelligence Computing Research (ICCIC), pp. 1–5 (2012)

    Google Scholar 

  4. Lima, M., dos Santos, A., Pujolle, G.: A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials 11, 66–77 (2009)

    Article  Google Scholar 

  5. Malik, N., Ahmed, A.H.A.: A survey of MANET survivability routing techniques. International Journal of Communications, Network and System Sciences 06(04), 176–185 (2013)

    Article  Google Scholar 

  6. Zhang, G., Zhang, H., Zhou, Z., Wang, C.: Research on the survivability based on the algorithms of the key point detection and compensation in ad hoc networks. In: 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), vol. 1, pp. 493–496 (2013)

    Google Scholar 

  7. Magán-Carrión, R., Camacho-Páez, J., García-Teodoro, P.: A security response approach based on the deployment of mobile agents. In: Demazeau, Y., Ishida, T., Corchado, J.M., Bajo, J. (eds.) PAAMS 2013. LNCS, vol. 7879, pp. 182–191. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Leitao, P., Marik, V., Vrba, P.: Past, present, and future of industrial agent applications. IEEE Transactions on Industrial Informatics 9(4), 2360–2372 (2013)

    Article  Google Scholar 

  9. Cho, Y., Smith, J., Smith, A.: Optimizing tactical military MANETs with a specialized PSO. In: 2010 IEEE Congress on Evolutionary Computation (CEC), pp. 1–6 (July 2010)

    Google Scholar 

  10. Dengiz, O., Konak, A., Smith, A.E.: Connectivity management in mobile ad hoc networks using particle swarm optimization. Ad Hoc Networks 9(7), 1312–1326 (2011)

    Article  Google Scholar 

  11. Miles, J., Kamath, G., Muknahallipatna, S., Stefanovic, M., Kubichek, R.: Optimal trajectory determination of a single moving beacon for efficient localization in a mobile ad-hoc network. Ad Hoc Networks (2012)

    Google Scholar 

  12. Lin, C.C.: Dynamic router node placement in wireless mesh networks: A PSO approach with constriction coefficient and its convergence analysis. Information Sciences 232, 294–308 (2013)

    Article  MathSciNet  Google Scholar 

  13. Taggu, A., Taggu, A.: TraceGray: an application-layer scheme for intrusion detection in MANET using mobile agents. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–4 (January 2011)

    Google Scholar 

  14. Roy, D.B., Chaki, R.: Detection of denial of service attack due to selfish node in MANET by mobile agent. In: Özcan, A., Zizka, J., Nagamalai, D. (eds.) WiMo/CoNeCo 2011. CCIS, vol. 162, pp. 14–23. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  15. Mohamed, Y., Abdullah, A.: Immune-inspired framework for securing hybrid MANET. In: IEEE Symposium on Industrial Electronics Applications, ISIEA 2009, vol. 1, pp. 301–306 (October 2009)

    Google Scholar 

  16. Chowdhury, C., Neogy, S.: Mobile agent security in MANET using reputation. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds.) PDCTA 2011. CCIS, vol. 203, pp. 158–168. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Magán-Carrión, R., Camacho-Páez, J., García-Teodoro, P. (2014). A Multiagent Self-healing System against Security Incidents in MANETs. In: Corchado, J.M., et al. Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection. PAAMS 2014. Communications in Computer and Information Science, vol 430. Springer, Cham. https://doi.org/10.1007/978-3-319-07767-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07767-3_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07766-6

  • Online ISBN: 978-3-319-07767-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics