메뉴 건너뛰기




Volumn 5103, Issue , 2003, Pages 74-91

An artificial immune system for securing mobile ad hoc networks against intrusion attacks

Author keywords

Artificial immune system; Detection rules; Dynamic routing protocols; Genetic algorithms; Intrusion detection; Malicious nodes; Mobile ad hoc networks; Pattern recognition

Indexed keywords

APPROXIMATION THEORY; GENETIC ALGORITHMS; MATRIX ALGEBRA; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PATTERN RECOGNITION; QUALITY OF SERVICE; ROUTERS; TOPOLOGY; VECTORS;

EID: 0344083606     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.488273     Document Type: Conference Paper
Times cited : (3)

References (40)
  • 4
    • 0003826083 scopus 로고    scopus 로고
    • Security-aware ad-hoc routing for wireless networks
    • Dept. of Comp. Sci., Univ. of Illinois, Urbana-Champaign, IL, Aug.
    • S. Yi, P. Naldurg and R. Kravets, "Security-aware ad-hoc routing for wireless networks," Tech. Rpt. UIUCDCS-R-2001-2241, Dept. of Comp. Sci., Univ. of Illinois, Urbana-Champaign, IL, Aug. 2001.
    • (2001) Tech. Rpt. , vol.UIUCDCS-R-2001-2241
    • Yi, S.1    Naldurg, P.2    Kravets, R.3
  • 7
    • 0003899978 scopus 로고    scopus 로고
    • The interzone routing protocol (BERP) for ad hoc networks
    • draft-ietf-manet-zone-ierp-01.txt, Jun 1
    • Z. J. Haas, M. Perlman and P. Samar, "The interzone routing protocol (BERP) for ad hoc networks," IETF MANET Working Group, draft-ietf-manet-zone-ierp-01.txt, Jun 1, 2001.
    • (2001) IETF MANET Working Group
    • Haas, Z.J.1    Perlman, M.2    Samar, P.3
  • 8
    • 0035415758 scopus 로고    scopus 로고
    • The performance of query control schemes of the zone routing protocol
    • Aug.
    • Z. J. Haas and M. Perlman, "The performance of query control schemes of the zone routing protocol," IEEE/ACM Trans. Networking, 9, pp. 427-438, Aug. 2001.
    • (2001) IEEE/ACM Trans. Networking , vol.9 , pp. 427-438
    • Haas, Z.J.1    Perlman, M.2
  • 9
    • 0031096869 scopus 로고    scopus 로고
    • Associativity-based routing for ad-hoc mobile networks
    • Mar.
    • C. K. Toh, "Associativity-based routing for ad-hoc mobile networks, " Wireless Pers. Commun. J., 4, pp. 103-139, Mar. 1997.
    • (1997) Wireless Pers. Commun. J. , vol.4 , pp. 103-139
    • Toh, C.K.1
  • 10
    • 0344095743 scopus 로고    scopus 로고
    • Using elliptic curve Diffie-Hellman in the SPKM GSS-API
    • Aug.
    • R. Zucceratto and C. Adams, "Using elliptic curve Diffie-Hellman in the SPKM GSS-API," Internet Draft, IETF, Aug. 1999.
    • (1999) Internet Draft, IETF
    • Zucceratto, R.1    Adams, C.2
  • 11
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Trans. Info.Theory, 22, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Info.Theory , vol.22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 12
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • Nov. 1
    • N. Asokan and P. Ginzboorg, "Key agreement in ad hoc networks, " Comp. Commun., 23, pp. 1627-1637, Nov. 1, 2000.
    • (2000) Comp. Commun. , vol.23 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 14
    • 0003580691 scopus 로고    scopus 로고
    • Wireless LAN media access control (MAC) and physical layer (PHY) specifications
    • IEEE Std. 802.11, "Wireless LAN media access control (MAC) and physical layer (PHY) specifications," http://standards.ieee.org/getieee802/, 1999.
    • (1999) IEEE Std. 802.11
  • 15
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • Feb.
    • H. Krawczyk, M. Bellare and R. Canetti, "HMAC: keyed-hashing for message authentication," IETF RFC 2104, Feb. 1997.
    • (1997) IETF RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 17
    • 73249134721 scopus 로고
    • Secure hash standard
    • Comp. Sys. Lab., MIST, Gaithersburg, MD, Apr.
    • "Secure hash standard," FIPS Pub. 180-1, Comp. Sys. Lab., MIST, Gaithersburg, MD, Apr. 1995.
    • (1995) FIPS Pub. , vol.180 , Issue.1
  • 18
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Apr.
    • R. Rivest, "The MD5 message-digest algorithm," IETF RFC 1321, Apr. 1992.
    • (1992) IETF RFC , vol.1321
    • Rivest, R.1
  • 19
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • Jun.
    • D. Dagupta and F. Gonzalez. "An immunity-based technique to characterize intrusions in computer networks," IEEE Trans. Evol. Comput., 6, pp. 281-291, Jun. 2002.
    • (2002) IEEE Trans. Evol. Comput. , vol.6 , pp. 281-291
    • Dagupta, D.1    Gonzalez, F.2
  • 22
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • S. A. Hofmeyr and S. Forrest. "Architecture for an artificial immune system," Evol. Comput., 8, pp. 443-473, 2000.
    • (2000) Evol. Comput. , vol.8 , pp. 443-473
    • Hofmeyr, S.A.1    Forrest, S.2
  • 24
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis, and implications
    • Oakland, CA, May
    • P. D'haeseleer, S. Forrest and P. Helman, "An immunological approach to change detection: algorithms, analysis, and implications," Proc. 1996 IEEE Symp. Comp. Security and Privacy, Oakland, CA, pp. 110-119, May 1996.
    • (1996) Proc. 1996 IEEE Symp. Comp. Security and Privacy , pp. 110-119
    • D'Haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 26
    • 0016557674 scopus 로고
    • Multidimensional binary search trees used for associative searching
    • Sept.
    • J. L. Bentley, "Multidimensional binary search trees used for associative searching," Commun. ACM, 18, pp. 509-517, Sept. 1975.
    • (1975) Commun. ACM , vol.18 , pp. 509-517
    • Bentley, J.L.1
  • 28
    • 84945709355 scopus 로고
    • An algorithm for finding best matches in logarithmic expected time
    • Sept.
    • J. H. Friedman, J. L. Bentley and R. A. Finkel, "An algorithm for finding best matches in logarithmic expected time," ACM Trans. Math Softw., 3. pp. 209-226, Sept. 1977.
    • (1977) ACM Trans. Math Softw. , vol.3 , pp. 209-226
    • Friedman, J.H.1    Bentley, J.L.2    Finkel, R.A.3
  • 34
    • 0012021893 scopus 로고    scopus 로고
    • Novelty detection in time series data using ideas from immunology
    • Jun.
    • D. Dasgupta and S. Forrest, "Novelty detection in time series data using ideas from immunology," Proc. Int. Conf. on Intelligent Sys., pp. 82-87, Jun. 1996.
    • (1996) Proc. Int. Conf. on Intelligent Sys. , pp. 82-87
    • Dasgupta, D.1    Forrest, S.2
  • 36
    • 0000401181 scopus 로고
    • A sequential niche technique for multimodal function optimization
    • D. Beasley, D. R. Bull and R. R. Martin, "A sequential niche technique for multimodal function optimization," Evol. Comput., 1, pp. 101-125, 1993.
    • (1993) Evol. Comput. , vol.1 , pp. 101-125
    • Beasley, D.1    Bull, D.R.2    Martin, R.R.3
  • 37
    • 0009949716 scopus 로고    scopus 로고
    • Evolving complex fuzzy classifier rules using a linear genetic representation
    • Morgan Kaufman, San Fran., CA, July
    • D. Dagupta and F. González, "Evolving complex fuzzy classifier rules using a linear genetic representation," Proc. Int. Conf. Genet. and Evol. Comput. (GECCO), Morgan Kaufman, San Fran., CA, July 2001
    • (2001) Proc. Int. Conf. Genet. and Evol. Comput. (GECCO)
    • Dagupta, D.1    González, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.