BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS

Although a lot of efforts have been made and a lot of studies have been carried out in networking security, we cannot go so far as to say the security requirements for the different types of networks are satisfied. As applications that are applicable to different networks mature, new security met...

詳細記述

保存先:
書誌詳細
主要な著者: Yasir Abdelgadir , Mohamed, Azween, Abdullah
フォーマット: 学位論文
出版事項: 2010
主題:
オンライン・アクセス:http://eprints.utp.edu.my/2696/1/PhD_Thesis.pdf
http://eprints.utp.edu.my/2696/
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
id my.utp.eprints.2696
record_format eprints
spelling my.utp.eprints.26962017-01-19T08:25:01Z BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS Yasir Abdelgadir , Mohamed Azween, Abdullah QA75 Electronic computers. Computer science Although a lot of efforts have been made and a lot of studies have been carried out in networking security, we cannot go so far as to say the security requirements for the different types of networks are satisfied. As applications that are applicable to different networks mature, new security methods are considered necessary. Infrastructure-less environments are dynamic and mostly difficult to control; hence security methods designed for other types of networks might not be applicable. Mobile Ad hoc Networks are subjected to more vulnerabilities than the fixed networks as they are self-organized, self-configured, and self-controlled infrastructure-less networks. As such, in this research we are concentrating more on securing mobile ad hoc networks. Within the wireless domain, packets are forwarded to the destination usually through the intermediate nodes that act as routers. Packets are more prone to different vulnerabilities while routed from a source to a destination passing through untrustworthy intermediate nodes. A change in one bit within an incoming packet may lead to serious security preaches. In this dissertation, an immune inspired node-based distributed detection system has been implemented. The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. The protocol has been implemented in a real wireless environment wherein the obtained results ascertain the protocol applicability. Moreover, other results have been achieved as the protocol has been simulated for benchmarking purposes. System complexity and scalability have been considered and analyzed. Although the immune-inspired security protocol (I2MANET) can be applied to many applications that rely on the wireless communications; in this dissertation, it has been specified to secure Mobile Telecommunication Services. 2010 Thesis NonPeerReviewed application/pdf http://eprints.utp.edu.my/2696/1/PhD_Thesis.pdf Yasir Abdelgadir , Mohamed and Azween, Abdullah (2010) BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS. PhD thesis, UNIVERSITI TEKNOLOGI PETRONAS. http://eprints.utp.edu.my/2696/
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Institutional Repository
url_provider http://eprints.utp.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Yasir Abdelgadir , Mohamed
Azween, Abdullah
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
description Although a lot of efforts have been made and a lot of studies have been carried out in networking security, we cannot go so far as to say the security requirements for the different types of networks are satisfied. As applications that are applicable to different networks mature, new security methods are considered necessary. Infrastructure-less environments are dynamic and mostly difficult to control; hence security methods designed for other types of networks might not be applicable. Mobile Ad hoc Networks are subjected to more vulnerabilities than the fixed networks as they are self-organized, self-configured, and self-controlled infrastructure-less networks. As such, in this research we are concentrating more on securing mobile ad hoc networks. Within the wireless domain, packets are forwarded to the destination usually through the intermediate nodes that act as routers. Packets are more prone to different vulnerabilities while routed from a source to a destination passing through untrustworthy intermediate nodes. A change in one bit within an incoming packet may lead to serious security preaches. In this dissertation, an immune inspired node-based distributed detection system has been implemented. The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. The protocol has been implemented in a real wireless environment wherein the obtained results ascertain the protocol applicability. Moreover, other results have been achieved as the protocol has been simulated for benchmarking purposes. System complexity and scalability have been considered and analyzed. Although the immune-inspired security protocol (I2MANET) can be applied to many applications that rely on the wireless communications; in this dissertation, it has been specified to secure Mobile Telecommunication Services.
format Thesis
author Yasir Abdelgadir , Mohamed
Azween, Abdullah
author_facet Yasir Abdelgadir , Mohamed
Azween, Abdullah
author_sort Yasir Abdelgadir , Mohamed
title BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
title_short BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
title_full BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
title_fullStr BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
title_full_unstemmed BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
title_sort biologically inspired protocol for securing a class of networks
publishDate 2010
url http://eprints.utp.edu.my/2696/1/PhD_Thesis.pdf
http://eprints.utp.edu.my/2696/
_version_ 1738655212269207552
score 13.250246