Abstract
Few proposals exist in the literature where security in networks and communications is studied from a pro-active perspective. One of them is MARS, a self-healing system intended to mitigate the malicious effects of common threats in MANETs. MARS makes use of special agent nodes to recover the loss of connectivity due to the operation of malicious nodes in the environment. Despite the general good performance of MARS, this paper shows some situations in which it does not work properly. This is caused by an inappropriate behavior of the optimization objective function considered in MARS. To overcome this limitation, a couple of alternative functions are designed and evaluated. The effectiveness of the new proposals is validated through extensive experiments. The new optimization functions lead to an increase in the resilience and tolerance of the network against security threats, improving network survivability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lakhtaria, K.I., Lakhtaria, K.I.: Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends, 1st edn. IGI Global, Hershey (2012)
Ehsan, H., Khan, F.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1181–1187 (2012)
Kanthe, A., Simunic, D., Prasad, R.: Effects of malicious attacks in mobile ad-hoc networks. In: 2012 IEEE International Conference on Computational Intelligence Computing Research (ICCIC), pp. 1–5 (2012)
Lima, M., dos Santos, A., Pujolle, G.: A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials 11, 66–77 (2009)
Malik, N., Ahmed, A.H.A.: A survey of MANET survivability routing techniques. International Journal of Communications, Network and System Sciences 06(04), 176–185 (2013)
Zhang, G., Zhang, H., Zhou, Z., Wang, C.: Research on the survivability based on the algorithms of the key point detection and compensation in ad hoc networks. In: 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), vol. 1, pp. 493–496 (2013)
Magán-Carrión, R., Camacho-Páez, J., García-Teodoro, P.: A security response approach based on the deployment of mobile agents. In: Demazeau, Y., Ishida, T., Corchado, J.M., Bajo, J. (eds.) PAAMS 2013. LNCS, vol. 7879, pp. 182–191. Springer, Heidelberg (2013)
Leitao, P., Marik, V., Vrba, P.: Past, present, and future of industrial agent applications. IEEE Transactions on Industrial Informatics 9(4), 2360–2372 (2013)
Cho, Y., Smith, J., Smith, A.: Optimizing tactical military MANETs with a specialized PSO. In: 2010 IEEE Congress on Evolutionary Computation (CEC), pp. 1–6 (July 2010)
Dengiz, O., Konak, A., Smith, A.E.: Connectivity management in mobile ad hoc networks using particle swarm optimization. Ad Hoc Networks 9(7), 1312–1326 (2011)
Miles, J., Kamath, G., Muknahallipatna, S., Stefanovic, M., Kubichek, R.: Optimal trajectory determination of a single moving beacon for efficient localization in a mobile ad-hoc network. Ad Hoc Networks (2012)
Lin, C.C.: Dynamic router node placement in wireless mesh networks: A PSO approach with constriction coefficient and its convergence analysis. Information Sciences 232, 294–308 (2013)
Taggu, A., Taggu, A.: TraceGray: an application-layer scheme for intrusion detection in MANET using mobile agents. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–4 (January 2011)
Roy, D.B., Chaki, R.: Detection of denial of service attack due to selfish node in MANET by mobile agent. In: Özcan, A., Zizka, J., Nagamalai, D. (eds.) WiMo/CoNeCo 2011. CCIS, vol. 162, pp. 14–23. Springer, Heidelberg (2011)
Mohamed, Y., Abdullah, A.: Immune-inspired framework for securing hybrid MANET. In: IEEE Symposium on Industrial Electronics Applications, ISIEA 2009, vol. 1, pp. 301–306 (October 2009)
Chowdhury, C., Neogy, S.: Mobile agent security in MANET using reputation. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds.) PDCTA 2011. CCIS, vol. 203, pp. 158–168. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Magán-Carrión, R., Camacho-Páez, J., García-Teodoro, P. (2014). A Multiagent Self-healing System against Security Incidents in MANETs. In: Corchado, J.M., et al. Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection. PAAMS 2014. Communications in Computer and Information Science, vol 430. Springer, Cham. https://doi.org/10.1007/978-3-319-07767-3_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-07767-3_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07766-6
Online ISBN: 978-3-319-07767-3
eBook Packages: Computer ScienceComputer Science (R0)