<span title="">2009</span> <i title="Taylor&#39;s University"> <a target="_blank" rel="noopener" href="" style="color: black;">Journal of Engineering Science and Technology</a> </i> &nbsp;
Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available. Forwarding packets or participating in routing process, either of each can directly affect the network security state.
more &raquo; ... vertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks. Even though immune-inspired approaches aren't essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multi-agent paradigm is presented. Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility.
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="">doaj:9cfa90dcca2040aaa7f85864176cb2fd</a> <a target="_blank" rel="external noopener" href="">fatcat:ptlckaar6vbhfpo7g6vyygrdtq</a> </span>
<a target="_blank" rel="noopener" href="" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>