Securing ad hoc networks through mobile agent

Yi Ping, Yao Yan, Hou Yafei, Zhong Yiping, Zhang Shiyong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The flexibility in space and time induces new challenges towards the security infrastructure. Contrary to their wired counterpart, mobile ad hoc networks do not have a clear line of defense, and every node must be prepared for encounters with an adversary. Therefore, a centralized or hierarchical network security solution does not work well. We provide scalable, distributed security architecture for mobile ad hoc networks in this paper. The architecture integrates the ideas of immune system and a multi-agent architecture. Compared with traditional security system, the proposed security architecture is designed to be distributed, autonomy, adaptability, scalability.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Information Security, InfoSecu '04
Pages125-129
Number of pages5
DOIs
Publication statusPublished - Dec 1 2004
Externally publishedYes
Event3rd International Conference on Information Security, InfoSecu '04 - Shanghai, China
Duration: Nov 14 2004Nov 16 2004

Publication series

NameACM International Conference Proceeding Series
Volume85

Other

Other3rd International Conference on Information Security, InfoSecu '04
CountryChina
CityShanghai
Period11/14/0411/16/04

    Fingerprint

Keywords

  • Immune system
  • Intrusion detection
  • Mobile ad hoc network
  • Mobile agent
  • Network security

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Cite this

Ping, Y., Yan, Y., Yafei, H., Yiping, Z., & Shiyong, Z. (2004). Securing ad hoc networks through mobile agent. In Proceedings of the 3rd International Conference on Information Security, InfoSecu '04 (pp. 125-129). (ACM International Conference Proceeding Series; Vol. 85). https://doi.org/10.1145/1046290.1046315