%0 Conference Paper %A Mohamed, Y.A. %A Abdullah, A.B. %D 2009 %F scholars:523 %K Broadband service; Corrupted data; Formal Specification; Human immune systems; Immune system; Immune systems; Malicious nodes; Networking security; Security frameworks, Formal logic; Immunology; Industrial electronics; Mobile ad hoc networks; Network security, Ad hoc networks %P 301-306 %R 10.1109/ISIEA.2009.5356451 %T Immune-inspired framework for securing hybrid MANET %U https://khub.utp.edu.my/scholars/523/ %V 1 %X A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability environment in each. In a step for providing secured and reliable broadband services, formal specification logic along with a novel Immuneinspired security framework (I2MANETs) have been introduced. The different immune components synchronized to the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the Human Immune System in: first response, second response, adaptability, distributability, survivability and other immune features. The I2MANETs can basically installed in one node in the domain, then automatically spread to the rest of the domain. © 2009 IEEE. %Z cited By 6; Conference of 2009 IEEE Symposium on Industrial Electronics and Applications, ISIEA 2009 ; Conference Date: 4 October 2009 Through 6 October 2009; Conference Code:79286