Skip to main content

Advertisement

Log in

Human immune-based model for intrusion detection in mobile ad hoc networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Mobile ad hoc network (MANET) is a collection of mobile, decentralized and self-organizing nodes that are used in special cases such as medical and military purposes. Securing mobile ad hoc network MANET is a crucial research issue. The properties of MANET impede the protection of the network’s environment against attacks. MANET as an open area of wireless mobile nodes allow external attackers to join the network easily and masquerade legitimate nodes. Therefore, the objective of this paper is to develop a distributed, self-organizing and hybrid intelligent model, called dendritic cell fuzzy algorithm (DCFA), for security routing in MANET. The DCFA model inspiring the detection functionality of dendritic cells (DCs) in human immune system (HIS) and the accurate decision-making functionality of fuzzy logic theory to detect network attacks in MANET. The DCFA model is developed and validated by detecting a flooding-based attack, namely, a resource consumption attack (RCA). QualNet v5.0.2 is used as a simulation environment to test the capability of DCFA in detecting RCA over MANET. The results show the capability of DCFA to perform the detection operation with high efficiency and effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Notes

  1. A fresh enough route contains a sequence number greater than or equal to that in the RREQ packet.

  2. The unit of energy is joule. Mjoule is millijoule, which is equal to 1 × 10−3 joule.

References

  1. Janeway CA, Travers P, Walport M, and Capra JD (2005) Immunobiology: the immune system in health and disease, 6 ed. vol. 1: Garland Science Publishing, New York

  2. de Castro LN, Timmis J (2002) Artificial immune systems: a novel paradigm to pattern recognition. Artificial Neural networks in Pattern Recognition 1:67–84

    Google Scholar 

  3. Costa Silva G, Caminhas WM, Palhares RM (2017) Artificial immune systems applied to fault detection and isolation. Appl Soft Comput 57:118–131

    Article  Google Scholar 

  4. Yang J, Liu X, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowl-Based Syst 22:115–119

    Article  Google Scholar 

  5. Sarafijanovic S, Le Boudec JY (2005) An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks. IEEE Trans Neural Netw 16(5):1076–1087

    Article  Google Scholar 

  6. Fanelli R (2010) Further experimentation with hybrid immune inspired network intrusion detection. Presented at the international conference on artificial immune systems

  7. Zheng C, Sicker D (2013) A survey on biologically inspired algorithms for computer networking. IEEE Communications Surveys & Tutorials 15(3):1160–1191

    Article  Google Scholar 

  8. Kant L, Young K, Younis O, Shallcross D, Sinkar K, McAuley A et al (2008) Network science based approaches to design and analyze MANETs for military applications. IEEE Commun Mag 46(11):55–61

    Article  Google Scholar 

  9. Alsaqour R, Abdelhaq M, Saeed R, Uddin M, Alsukour O, Al-Hubaishi M et al (2015) Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic. J Netw Comput Appl 47:32–46

    Article  Google Scholar 

  10. Hu X, Chu TH, Leung VC, Ngai EC-H, Kruchten P, Chan HC (2015) A survey on mobile social networks: applications, platforms, system architectures, and future research directions. IEEE Communications Surveys & Tutorials 17:1557–1581

    Article  Google Scholar 

  11. Yih-Chun H and Perrig A (2004) A survey of secure wireless ad hoc routing. Security & Privacy, IEEE, vol. 2, pp. 28–39

  12. Lima M, Dos Santos A, Pujolle G (2009) A survey of survivability in mobile ad hoc networks. Communications Surveys & Tutorials, IEEE 11:66–77

    Article  Google Scholar 

  13. Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal 54:1115–1126

    Article  Google Scholar 

  14. Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100

  15. Abdelhaq M, Hassan R, Ismail M (2013) Performance evaluation of mobile ad hoc networks under flooding-based attacks. Int J Commun Syst. https://doi.org/10.1002/dac.2615

  16. Pastrana S, Mitrokotsa A, Orfila A, Peris-Lopez P (2012) Evaluation of classification algorithms for intrusion detection in MANETs. Knowl-Based Syst 36:217–225

    Article  Google Scholar 

  17. Mitchell R, Chen R (2014) A survey of intrusion detection in wireless network applications. Comput Commun 42:1–23

    Article  Google Scholar 

  18. Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7:25

    Article  Google Scholar 

  19. Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials 15:2027–2045

    Article  Google Scholar 

  20. Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on, pp. 202–212

  21. Matzinger P (2002) The danger model: a renewed sense of self. Science 296:301–305

    Article  Google Scholar 

  22. Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Security and Communication Networks

  23. Ou C-M (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88:78–86

    Article  Google Scholar 

  24. Chelly Z, Elouedi Z (2010) FDCM: A fuzzy dendritic cell method. International Conference on Artificial Immune Systems:102–115

  25. Chelly Z, Elouedi Z (2016) A survey of the dendritic cell algorithm. Knowl Inf Syst 48:505–535

    Article  Google Scholar 

  26. Fanelli RL (2010) Further experimentation with hybrid immune inspired network intrusion detection. International Conference on Artificial Immune Systems:264–275

  27. Fanelli RL (2008) A hybrid model for immune inspired network intrusion detection. International Conference on Artificial Immune Systems:107–118

  28. Wallenta C, Kim J, Bentley PJ, Hailes S (2010) Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. Appl Intell 32:1–26

    Article  Google Scholar 

  29. Drozda M, Schaust S, Szczerbicka H (2010) Immuno-inspired knowledge management for ad hoc wireless networks. Smart Information and Knowledge Management, ed: Springer, pp. 1–26

  30. Drozda M, Schaust S, Schildt S, Szczerbicka H (2009) An Error Propagation Algorithm for Ad Hoc Wireless Networks. International Conference on Artificial Immune Systems:260–273

  31. Greensmith J, Aickelin U, Tedesco G (2010) Information fusion for anomaly detection with the dendritic cell algorithm. Information Fusion 11:21–34

    Article  Google Scholar 

  32. Greensmith J, Aickelin U, Cayzer S (2008) Detecting danger: The dendritic cell algorithm. Robust Intelligent Systems, ed: Springer, pp. 89–112

  33. Gu F, Greensmith J, Aicklein U (2012) The dendritic cell algorithm for intrusion detection. in Biologically Inspired Networking and Sensing: Algorithms and Architectures, ed: IGI Global, pp. 84–102

  34. Kim J, Bentley PJ, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection–a review. Nat Comput 6:413–466

    Article  MathSciNet  Google Scholar 

  35. Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J (2003) Danger theory: The link between AIS and IDS? International Conference on Artificial Immune Systems:147–155

  36. McClure S, Scambray J, Kurtz G (2005) Hacking exposed: network security secrets & solutions. McGraw-Hill/Osborne, New York

    Google Scholar 

  37. Sarafijanovic S, Le Boudec J-Y (2005) An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors. Int J Unconv Comput 1:221–254

    Google Scholar 

  38. Janeway CA (1998) The road less traveled: the role of innate immunity in the adaptive immune response-presidential address to the American Association of Immunologists. J Immunol 161:539–544

    Google Scholar 

  39. Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10:1–35

    Article  Google Scholar 

  40. Bretscher PA (1999) A two-step, two-signal model for the primary activation of precursor helper T cells. Proc Natl Acad Sci 96:185–190

    Article  Google Scholar 

  41. e Sousa CR (2001) Dendritic cells as sensors of infection. Immunity 14:495–498

    Article  Google Scholar 

  42. Oshashi PS, De Franco AL (2002) Making and breaking tolerance. Curr Opin Immunol 14:744–759

    Article  Google Scholar 

  43. Motran CC, Ambrosio LF, Volpini X, Celias DP, Cervi L (2017) Dendritic cells and parasites: from recognition and activation to immune response instruction. Semin Immunopathol:199–213

  44. Zadeh LA (2015) Fuzzy logic—a personal perspective. Fuzzy Sets Syst 281:4–20

    Article  MathSciNet  Google Scholar 

  45. Yan J, Ryan M, Power J (1995) Using fuzzy logic: towards intelligent systems. Prentice-Hall, Inc., Upper Saddle River

    Google Scholar 

  46. Cui S, Goldsmith AJ, Bahai A (2005) Energy-constrained modulation optimization. IEEE Transactions on Wireless Communications 4:2349–2360

    Article  Google Scholar 

  47. Feeney LM, Nilsson M (2001) Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1548–1557

  48. Q. Simulator. (2012) Scalable network technologies. Available: http://www.scalable-networks.com/content/

  49. Forkel I, Schinnenburg M, Wouters B (2003) Performance evaluation of soft handover in a realistic UMTS network. In The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring., pp. 1979-1983

  50. Khalil I, Bagchi S, Shroff NB (2005) LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. in Dependable Systems and Networks, 2005. DSN 2005. Proceedings International Conference on, pp. 612–621

  51. Ou C-M, Ou C, Wang Y-T (2013) Agent-Based Artificial Immune Systems (ABAIS) for intrusion detections: inspiration from danger theory. in Agent and Multi-Agent Systems in Distributed Systems-Digital Economy and E-Commerce, ed: Springer, pp. 67–94

Download references

Acknowledgments

This research project was funded by Deanship of Scientific Research, Princess Nourah bint Abdulrahman University, through the Program of Research Project Funding After Publication, grant No (41 - PRFA-P-2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maha Abdelhaq.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdelhaq, M., Alsaqour, R., Algarni, A. et al. Human immune-based model for intrusion detection in mobile ad hoc networks. Peer-to-Peer Netw. Appl. 13, 1046–1068 (2020). https://doi.org/10.1007/s12083-019-00862-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00862-9

Keywords

Navigation