eprintid: 595 rev_number: 2 eprint_status: archive userid: 1 dir: disk0/00/00/05/95 datestamp: 2023-11-09 15:48:44 lastmod: 2023-11-09 15:48:44 status_changed: 2023-11-09 15:22:47 type: conference_item metadata_visibility: show creators_name: Mohamed, Y.A. creators_name: Abdullah, A.B. title: Immune inspired framework for ad hoc network security ispublished: pub keywords: Ad hoc security; Artificial Immune System; Artificial Neural Network; Danger theories; DNA computation; Evolutionary computations; Human bodies; Human immune systems; Immune systems; Malicious nodes; Negative selection; Proposed architectures; Robust systems; Routing process; Security Architecture; Self recovery, Immunology; Mobile ad hoc networks; Mobile telecommunication systems; Network security; Neural networks; Telecommunication networks, Ad hoc networks note: cited By 11; Conference of 2009 IEEE International Conference on Control and Automation, ICCA 2009 ; Conference Date: 9 December 2009 Through 11 December 2009; Conference Code:79701 abstract: As a comprehensive security system, researchers recently have turned to the human immune system as a very wealthy source of inspiration. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the research interest which can be pointed out. By means of diverse kinds of cells, molecules, and mechanisms, the immune system efficiently protects the human body against different kinds of attacks. Many immune-inspired techniques have been developed with the aim to tackle different computing problems. Network security represents one of the most significant fields that the immune-inspired techniques have been applied to. Given that mobile ad hoc networks have a decentralized nature similar to the human immune system (HIS), immune-inspired security architecture is highly expected to come across different ad hoc security problems, one of which is the malicious node that can disrupt the routing process, masquerade as the legitimate nodes, and impersonate the trusted nodes. In this paper, immune-inspired security architecture for simulating a number of HIS processes for securing mobile ad hoc networks is presented. Both the negative selection and danger theory techniques have been combined along with many other inspired processes to come up with a scalable and robust system. Distributability, second response and self recovery of nodes, are the hallmarks of the proposed architecture. ©2009 IEEE. date: 2009 official_url: https://www.scopus.com/inward/record.uri?eid=2-s2.0-77950399120&doi=10.1109%2fICCA.2009.5410147&partnerID=40&md5=8ff45b8c8b6c58fe475edee7cffe07ae id_number: 10.1109/ICCA.2009.5410147 full_text_status: none publication: 2009 IEEE International Conference on Control and Automation, ICCA 2009 place_of_pub: Christchurch pagerange: 297-302 refereed: TRUE isbn: 9781424447060 citation: Mohamed, Y.A. and Abdullah, A.B. (2009) Immune inspired framework for ad hoc network security. In: UNSPECIFIED.