Energy Efficient Security in MANETs: A Comparison of Cryptographic and Artificial Immune Systems

Nauman Mazhar

Abstract


MANET is characterised by a set of mobile nodes in an inherently insecure environment, having limited battery capacities. Provisioning of energy efficient security in MANETs is, therefore, an open problem for which a number of solutions have been proposed. In this paper, we present an overview and comparison of the MANET security at routing layer by using the cryptographic and Artificial Immune System (AIS) approaches. The BeeAdHoc protocol, which is a Bio-inspired MANET routing protocol based on the foraging principles of honey bee colony, is taken as case study. We carry out an analysis of the three security frameworks that we have proposed earlier for securing BeeAdHoc protocol; one based on asymmetric key encryption, i.e BeeSec, and the other two using the AIS approach, i.e BeeAIS based on self non-self discrimination from adaptive immune system and BeeAIS-DC based on Dendritic Cell (DC) behavior from innate immune system. We extensively evaluate the performance of the three protocols through network simulations in ns-2 and compare with BeeAdHoc, the base protocol, as well as with state-of-the-art MANET routing protocols DSR and AODV. Our results clearly indicate that AIS based systems provide security at much lower cost to energy as compared with the cryptographic systems. Moreover, the use of dendritic cells and danger signals instead of the classical self non-self discrimination allows to detect the non-self antigens with greater accuracy. Based on the results of this investigation, we also propose a composite AIS model for BeeAdHoc security by combining the concepts from both the adaptive and the innate immune systems by modelling the attributes and behavior of the B-cells and DCs.

Full Text:

PDF

References


Royer, E. and Toh, C. K.; IEEE Personal Communications, (April 1999), 46–55.

Toh, C. K.; Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall, (2001).

Perkins, C., and Bhagwat, P.; Proc. of ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and Applications, (1994), 234–244.

Perkins, C. and Royer, E.; Proc. of Second IEEE Workshop on Mobile Computing Systems and Applications, (February 1999), 90–100.

David, B. J. and David, A. M.; Mobile Computing, Kluwer Academic Publishers, (1996), 153–181.

Zhou, L. and Haas, Z. J.; IEEE Network Magazine, 13(6)(1999), 24–30.

Suresh, S., Mike, W. and Raghavendra, C. S.; Proc. of Fourth ACM/IEEE Conference on Mobile Computing and Networking, (1998), 181–190.

Christine, E. J., Krishna, M. S., Prathima A. and JyhCheng C.; Wireless Networks, 7(4) (2001), 343–358.

Laura, M. F.; Mobile Networks and Applications, 6(3) (2001), 239–249.

Yih-Chun, H., Adrian, P. and David, B. J.; Wireless Networks, 11(1-2)(2005), 21–38.

Zapata, M. G.; Internet-Draft, draft-guerrero-manetsaodv-05.txt, February, 2005.

Stallings, W.; Cryptography and Network Security - Principles and Practices, Pearson Educ. Inc., 2003.

Dasgupta, D.; Artificial Immune Systems and Their Applications, Springer-Verlag, Berlin, (1998), 3–21.

Hofmeyr, S.; An immunological model of distributed detection and its application to computer security, PhD Thesis, University of New Mexico, 1999.

Kim, J. and Bentley, P.; Proc. of EUFIT’99, 1999.

Aickelin, U., Greensmith, J. and Twycross, J.; Proc. of 3rd International Conference on Artificial Immune Systems, LNCS 3239, Springer-Verlag, (2004), 316– 329.

Kim, J. and Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G. and Twycross, J.; Natural Computing, 6(4) (2007), 413–466.

Sarafijanovic, S. and Le Boudec, J. Y.; IEEE Transactions on Neural Networks, 16(5), Sep 2005.

Caro, G. Di, Ducatelle, F. and Gambardella, L. M.; Proc. of Parallel Problem Solving from Nature, LNCS 3242, Springer-Verlag Berlin Heidelberg, (2004), 461– 470.

Caro, G. Di, Ducatelle, F. and Gambardella, L. M.; European Transactions on Telecommunications, 16(2)( 2005), 443–455.

Roth, M. and Wicker, S.; Proc. of Second Mediterranean Workshop on Ad-Hoc Networks, 2003.

Roth, M. and Wicker, S.; In Proc. Stigmergic Optimization, Studies in Computational Intelligence, Springer Berlin Heidelberg, 31(2006), 155–184.

Roth, M. and Wicker, S.; In Proc. of IEEE GLOBECOM, Dec 2003.

Wedde, H. F. and Farooq, M.; Proc. of IEEE Swarm Intelligence Symposium, (2005), 341–348.

Wedde, H. F. and Farooq, M., Pannenbaecker, T., Vogel, B., Mueller, C., Meth, J. and Jeruschkat R.; Proc. of ACM Genetic and Evolutionary Computation Conference, (June 2005), 153–160.

Wedde, H. F. and Farooq, M., Timm, C., Fischer, J., Kowalski, M., Langhans, M., Range, N., Schletter, C., Tarak, R., Tchatcheu, M., Volmering, F., Werner, S. and Wang, K.; Technical Report PG-460, LS III, School of Computer Science, University of Dortmund, 2005.

Li, J., Blake, C., Douglas, S. J. De Couto, Hu I. L., and Morris, R.; Proc. of 7th ACM International Conference on Mobile Computing and Networking, July 2001.

Rodoplu, V. and Meng, T. H.; IEEE Journal on Selected Areas in Communications, 17(8)(August 1999), 1333-1344.

Seeley, T. D.; The Wisdom of the Hive, Harvard University Press, London, 1995.

Von Frisch, K.; The Dance Language and Orientation of Bees, Harvard University Press, Cambridge, 1967.

Mazhar, N. and Farooq, M.; Proc. 9th Annual Conference on Genetic and Evolutionary Computation, (July 2007), 102–109.

Mazhar, N. and Farooq, M.; Proc. 6th International Conference on Artificial Immune Systems, LNCS 4628, Springer-Verlag Berlin Heidelberg, (Aug 2007), 370–381.

Mazhar, N. and Farooq, M.; Proc. 10th Annual Conference on Genetic and Evolutionary Computation, July 2008.

Stallings, W.; Data & Computer Communications, Pearson Educ. Inc., 2000.

Perlman, R.; Network layer protocols with byzantine robustness, PhD Thesis, Deptt of Elec. Engg. and Computer Science, MIT, 1998.

De Castro L. N. and Timmis, J.; Artificial Immune Systems: A New Computational Intelligence Approach, Springer-Verlag, UK, Sep 2002.

Hofmeyr, S. and Forrest, S.; Evolutionary Computation Journal, (2000), 443–473.

Ranang, M. T.; An artificial immune system approach to preserving security in computer networks, MS Thesis, Norwegian University of Science and Technology, June 2002.

De Castro, L. N.; Proc. of the ICANNGA, April 2001.

Marrack, P. and Kappler, J.; Scientific American, 263(3)(Sep 1993), 48–55.

Matzinger, P.; Annual Reviews in Immunology, 12(1994), 991–1045.

Hart, E. and Timmis, J.; Proc. of 4th International Conference on Artificial Immune Systems, LNCS 3627, (2005), 483–497.

Forrest, S., Perelson, A., Allen, L. and Cherukuri, R.; Proc. of IEEE Symposium on Security and Privacy, IEEE Computer Society, (1994), 202.

Debar, H., Dacier, M. and Wepsi, A.; Computer Networks, (2000), 361–378.

Forrest, S., Hofmeyr, S. and Somayaji, A.; Proc. of IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1996.

Forrest, S., Hofmeyr, S. and Somayaji, A.; Computer immunology, Communications of the ACM, (1997), 88–96.

Kim, J. and Bently, P. J.; IEEE Transactions on Evolutionary Computing, 2001.

Kim, J. and Bently, P. J.; Proc. of Congress on Evolutionary Computation (CEC), (2001), 1244–1252.

Kim, J. and Bently, P. J.; Proc. of Genetic and Evolutionary Computation Conference, (2002), 1330– 1337.

Gonzalez, F., Dasgupta, D. and Nino, L. F.; Proc. of 2nd International Conference on Artificial Immune Systems, LNCS 2728. Springer-Verlag, 2003.

Ji, Z. and Dasgupta, D.; Proc. of the ACM Genetic and Evolutionary Computation Conference, USA, 2004.

Aickelin, U., Bentley, P., Cayzer, S., Kim, J. and McLeod, J.; Proc. of 2nd International Conference on Artificial Immune Systems (ICARIS’03), LNCS 2728, Springer-Verlag, (2003), 147–155.

Aickelin, and Cayzer, S.; Proc. of 1st International Conference on Artificial Immune Systems, University of Kent, Canterbury Printing Unit, (2002), 141–148.

Danger Project. http://www.dangertheory.com.

Greensmith, J.; The dendritic cell algorithm, PhD Thesis, University of Nottingham, Oct 2007.

Twycross, J.; Integrated innate and adaptive artificial immune systems applied to process anomaly detection, PhD Thesis, University of Nottingham, Jan 2007.

Greensmith, J., Aickelin, U. and Cayzer, S.; Proc. of 4th International Conference on Artificial Immune Systems, LNCS 3627, Springer-Verlag, (2005), 153– 167.

Greensmith, J., Aickelin, U. and Twycross, J.; Proc. of 5th International Conference on Artificial Immune Systems, LNCS 4163, (2006), 404–417.

Greensmith, J., Twycross, J., and Aickelin, U.; Proc. of Congress on Evolutionary Computation (CEC), (2006), 664–671.

Peterson, L. L. and Davie, B. S.; Computer Networks: A Systems Approach, Morgan Kaufmann, 1996.

Feeney, L. M. and Nilsson, M.; Proc. of IEEE INFOCOM, 2001.






Copyright (c) 2016 Nauman Mazhar

Powered By KICS