An Artificial Immune System-Based Strategy to Enhance Reputation in MANETs

Main Article Content

Lincy Elizebeth Jim
Mark A Gregory


MANET, Trust, Reputation, Selfish, PAMP, Artificial Immune System


In Mobile Ad hoc Networks (MANETs) the nodes act as a host as well as a router, thereby forming a self-organizing network that does not rely upon fixed infrastructure, other than gateways to other networks. Security is important for MANETs and trust computation is used to improve collaboration between nodes. This paper proposes an Artificial Immune System-based reputation (AISREP) algorithm to compute trust and thereby provide a resilient reputation mechanism. In this paper, the presence of selfish nodes are considered. Selfish nodes are known to enhance the reputation of their selfish peers which in turn causes packet loss. In the event of the packet being routed using the AISREP algorithm, even though the number of selfish nodes increases, this algorithm identifies the selfish nodes and avoids using the selfish nodes from the routing path thereby improving the overall performance of the network.

Abstract 461 | 176-PDF-pp68-82 Downloads 2


Abdelhaq, M., Hassan, R., & Alsaqour, R. (2011). Using dendritic cell algorithm to detect the resource consumption attack over MANET. Paper presented at the International Conference on Software Engineering and Computer Systems.

Aickelin, U., & Cayzer, S. (2008). The danger theory and its application to artificial immune systems. arXiv preprint arXiv:0801.3549.

Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2013). Mobile ad hoc networking. Hoboken: John Wiley & Sons. doi: 10.1002/0471656895

Buchegger, S., & Le Boudec, J.-Y. (2005). Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, 43(7), 101-107.

Forrest, S., Perelson, A. S., Allen, L., & Cherukuri, R. (1994). Self-nonself discrimination in a computer. Research in Security and Privacy, 1994. Proceedings, 1994 IEEE Computer Society Symposium.

Greensmith, J., & Aickelin, U. (2008). The deterministic dendritic cell algorithm. Paper presented at the International Conference on Artificial Immune Systems.

Gupta, N., & Singh, S. N. (2016). Wormhole attacks in MANET. Paper presented at the Cloud System and Big Data Engineering (Confluence), 2016 6th International Conference.

Henderson, T. R., Lacage, M., Riley, G. F., Dowell, C., & Kopena, J. (2008). Network simulations with the ns-3 simulator. SIGCOMM demonstration, 14(14), 527.

Ishmanov, F., & Kim, S. W. (2011). A secure trust establishment in wireless sensor networks. Paper presented at the Electrical Engineering and Informatics (ICEEI), 2011 International Conference.

Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP, 11(1), 1-12.

Matzinger, P. (2001). Essay 1: the Danger model in its historical context. Scandinavian journal of immunology, 54(1?2),4-9.

McCoy, D., Sicker, D., & Grunwald, D. (2007). A mechanism for detecting and responding to misbehaving nodes in wireless networks. Paper presented at the Networking Technologies for Software Define Radio Networks, 2007 2nd IEEE Workshop.

Mei, J.-P., Yu, H., Liu, Y., Shen, Z., & Miao, C. (2014). A social trust model considering trustees’ influence. Paper presented at the International Conference on Principles and Practice of Multi-Agent Systems.

Murthy, S., & Garcia-Luna-Aceves, J. J. (1996). An efficient routing protocol for wireless networks. Mobile Networks and Applications, 1(2), 183-197.

Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (2070-1721). IETF RFC 3561.

Raffo, D. (2005). Security schemes for the OLSR protocol for ad hoc networks. Université Pierre et Marie Curie-Paris VI.

Saha, H. N., Bhattacharyya, D., Banerjee, B., Mukherjee, S., Singh, R., & Ghosh, D. (2013). A review on attacks and secure routing protocols in MANET. International Journal of Innovative Research and Review, 1(2), 12-36.

Schütte, M. (2006). Detecting selfish and malicious nodes in MANETs. Paper presented at the Seminar: sicherheit in selbstorganisierenden netzen, hpi/universität potsdam, sommersemester.

Sen, J., Chandra, M. G., Harihara, S., Reddy, H., & Balamuralidhar, P. (2007). A mechanism for detection of gray hole attack in mobile Ad Hoc networks. Paper presented at the Information, Communications & Signal Processing, 2007 6th International Conference.

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE transactions on parallel and distributed systems, 20(11), 1698-1712.

Sharma, N., & Sharma, A. (2012). The black-hole node attack in MANET. Paper presented at the Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference.

Steinman, R. M., & Cohn, Z. A. (1973). Identification of a novel cell type in peripheral lymphoid organs of mice: I. Morphology, quantitation, tissue distribution. Journal of Experimental Medicine, 137(5), 1142-1162.

Tan, H. C., Ma, M., Labiod, H., Chong, P. H. J., & Zhang, J. (2017). A non?biased trust model for wireless mesh networks. International Journal of Communication Systems, 30(9), e3200.

Twycross, J., & Aickelin, U. (2005). Towards a conceptual framework for innate immunity. Paper presented at the International Conference on Artificial Immune Systems.

Xiong, L., & Liu, L. (2003). A reputation-based trust model for peer-to-peer ecommerce communities. Proceedings of the 4th ACM conference on Electronic commerce.

Yih-Chun, H., & Perrig, A. (2004). A survey of secure wireless ad hoc routing. IEEE Security & Privacy, 2(3), 28-39.

Most read articles by the same author(s)

1 2 3 > >>