Share Email Print

Proceedings Paper

Securing MANETs with BITSI: danger theory and mission continuity
Author(s): Marco Carvalho; Richard Ford; William Allen; Gerald Marin
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

MANET (Mobile Ad hoc Network) environments are becoming increasingly important as potential users recognize the benefits of being able to create a functional network using little or no fixed infrastructure. Unfortunately, the very properties that provide such flexibility also cause significant complications in terms of security. The collaborative nature of the system combined with its continual state of flux requires solutions that are highly dynamic, and that can adapt to massive changes in system resources, traffic patterns and network topology. In this paper, we outline a new approach to MANET security called BITSI (the Biologically-Inspired Tactical Security Infrastructure). BITSI is based upon the concepts of Artificial Immune Systems and Danger Theory. After introducing the motivations for BITSI we provide a brief description of its underlying theories and proposed architecture. Two experiments conducted within our MANET simulator are described, and we demonstrate that BITSI can detect and respond to certain classes of Denial of Service attacks. Finally, we describe our future plans for BITSI, and how its approach can be combined with other, more traditional, security solutions.

Paper Details

Date Published: 17 March 2008
PDF: 11 pages
Proc. SPIE 6973, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730D (17 March 2008); doi: 10.1117/12.777756
Show Author Affiliations
Marco Carvalho, Institute for Human and Machine Cognition (United States)
Richard Ford, Florida Institute of Technology (United States)
William Allen, Florida Institute of Technology (United States)
Gerald Marin, Florida Institute of Technology (United States)

Published in SPIE Proceedings Vol. 6973:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008
William J. Tolone; William Ribarsky, Editor(s)

© SPIE. Terms of Use
Back to Top