TY - JOUR A1 - Mohamed, Y.A. A1 - Abdullah, A.B. UR - https://www.scopus.com/inward/record.uri?eid=2-s2.0-68349129989&partnerID=40&md5=3552f2ada5f516fff359a449338553f9 N1 - cited By 6 ID - scholars723 EP - 242 SN - 18234690 N2 - Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available. Forwarding packets or participating in routing process, either of each can directly affect the network security state. Nevertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks. Even though immune-inspired approaches aren't essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multi-agent paradigm is presented. Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility. © School of Engineering, Taylor's University College. Y1 - 2009/// TI - Security mechanism for manets IS - 2 VL - 4 SP - 231 AV - none JF - Journal of Engineering Science and Technology ER -