KEYWORDS: Computing systems, Network security, Computer security, Defense and security, RGB color model, Information security, Mobile communications, Artificial intelligence, Information operations, Computer intrusion detection
Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat
operations. Their open and shared communication medium enables new forms of attack that are not applicable for
traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the
new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work
in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate
routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results
indicate that the approach is successful in routing network traffic around compromised computers.
MANET (Mobile Ad hoc Network) environments are becoming increasingly important as potential users recognize
the benefits of being able to create a functional network using little or no fixed infrastructure. Unfortunately,
the very properties that provide such flexibility also cause significant complications in terms of security. The
collaborative nature of the system combined with its continual state of flux requires solutions that are highly
dynamic, and that can adapt to massive changes in system resources, traffic patterns and network topology.
In this paper, we outline a new approach to MANET security called BITSI (the Biologically-Inspired Tactical
Security Infrastructure). BITSI is based upon the concepts of Artificial Immune Systems and Danger Theory.
After introducing the motivations for BITSI we provide a brief description of its underlying theories and proposed
architecture. Two experiments conducted within our MANET simulator are described, and we demonstrate that
BITSI can detect and respond to certain classes of Denial of Service attacks. Finally, we describe our future
plans for BITSI, and how its approach can be combined with other, more traditional, security solutions.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.