Paper
17 March 2008 Securing MANETs with BITSI: danger theory and mission continuity
Marco Carvalho, Richard Ford, William Allen, Gerald Marin
Author Affiliations +
Abstract
MANET (Mobile Ad hoc Network) environments are becoming increasingly important as potential users recognize the benefits of being able to create a functional network using little or no fixed infrastructure. Unfortunately, the very properties that provide such flexibility also cause significant complications in terms of security. The collaborative nature of the system combined with its continual state of flux requires solutions that are highly dynamic, and that can adapt to massive changes in system resources, traffic patterns and network topology. In this paper, we outline a new approach to MANET security called BITSI (the Biologically-Inspired Tactical Security Infrastructure). BITSI is based upon the concepts of Artificial Immune Systems and Danger Theory. After introducing the motivations for BITSI we provide a brief description of its underlying theories and proposed architecture. Two experiments conducted within our MANET simulator are described, and we demonstrate that BITSI can detect and respond to certain classes of Denial of Service attacks. Finally, we describe our future plans for BITSI, and how its approach can be combined with other, more traditional, security solutions.
© (2008) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Marco Carvalho, Richard Ford, William Allen, and Gerald Marin "Securing MANETs with BITSI: danger theory and mission continuity", Proc. SPIE 6973, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730D (17 March 2008); https://doi.org/10.1117/12.777756
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer security

Defense and security

Computer simulations

Information security

Artificial intelligence

Computing systems

RELATED CONTENT


Back to Top