Dendritic Cell Fuzzy Logic Algorithm over Mobile Ad Hoc Networks

Maha Abdelhaq, Raed Alsaqour, Mahamod Ismail, Shawkat Abdelhaq

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

A mobile ad hoc network (MANET) is an open wireless network of mobile, decentralized, and self-organized nodes with limited energy and bandwidth resources. The MANET environment is vulnerable to dangerous attacks, such as flooding-based attacks, which paralyze the functionality of the whole network. This paper introduces a hybrid intelligent algorithm, which can meet the challenge of protecting MANET with effective security and network performance. This objective is fulfilled by inspiring the abstract anomaly detection of dendritic cells (DCs) in the human immune system and the accurate decision-making functionality of fuzzy logic theory to introduce a dendritic Cell Fuzzy Algorithm (DCFA). DCFA combines the relevant features of danger theory-based AISs and fuzzy logic theory-based systems. DCFA is verified using QualNet v5.0.2 to detect resource consumption attack. The results show the efficient capability of DCFA to perform the detection operation with high network and security performance.

Original languageEnglish
Title of host publicationProceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS
PublisherIEEE Computer Society
Pages64-69
Number of pages6
Volume2015-October
ISBN (Print)9781479982578
DOIs
Publication statusPublished - 28 Oct 2015
Event6th International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2015 - Kuala Lumpur, Malaysia
Duration: 9 Feb 201511 Feb 2015

Other

Other6th International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2015
CountryMalaysia
CityKuala Lumpur
Period9/2/1511/2/15

Fingerprint

Dendritic Cells
Mobile ad hoc networks
Mobile Ad Hoc Networks
Fuzzy Algorithm
Fuzzy Logic
Fuzzy logic
Attack
Resources
Immune system
Anomaly Detection
Flooding
Immune System
Network Performance
Network performance
Decentralized
Wireless Networks
Wireless networks
Decision making
Decision Making
Bandwidth

Keywords

  • artificial immune system
  • danger theory
  • fuzzy logic theory
  • mobile ad hoc network
  • resource consumption attack

ASJC Scopus subject areas

  • Artificial Intelligence
  • Software
  • Modelling and Simulation
  • Theoretical Computer Science

Cite this

Abdelhaq, M., Alsaqour, R., Ismail, M., & Abdelhaq, S. (2015). Dendritic Cell Fuzzy Logic Algorithm over Mobile Ad Hoc Networks. In Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS (Vol. 2015-October, pp. 64-69). [7311211] IEEE Computer Society. https://doi.org/10.1109/ISMS.2015.36

Dendritic Cell Fuzzy Logic Algorithm over Mobile Ad Hoc Networks. / Abdelhaq, Maha; Alsaqour, Raed; Ismail, Mahamod; Abdelhaq, Shawkat.

Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS. Vol. 2015-October IEEE Computer Society, 2015. p. 64-69 7311211.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abdelhaq, M, Alsaqour, R, Ismail, M & Abdelhaq, S 2015, Dendritic Cell Fuzzy Logic Algorithm over Mobile Ad Hoc Networks. in Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS. vol. 2015-October, 7311211, IEEE Computer Society, pp. 64-69, 6th International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2015, Kuala Lumpur, Malaysia, 9/2/15. https://doi.org/10.1109/ISMS.2015.36
Abdelhaq M, Alsaqour R, Ismail M, Abdelhaq S. Dendritic Cell Fuzzy Logic Algorithm over Mobile Ad Hoc Networks. In Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS. Vol. 2015-October. IEEE Computer Society. 2015. p. 64-69. 7311211 https://doi.org/10.1109/ISMS.2015.36
Abdelhaq, Maha ; Alsaqour, Raed ; Ismail, Mahamod ; Abdelhaq, Shawkat. / Dendritic Cell Fuzzy Logic Algorithm over Mobile Ad Hoc Networks. Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS. Vol. 2015-October IEEE Computer Society, 2015. pp. 64-69
@inproceedings{c0ad175843e14a2488bea69d2f19a9ad,
title = "Dendritic Cell Fuzzy Logic Algorithm over Mobile Ad Hoc Networks",
abstract = "A mobile ad hoc network (MANET) is an open wireless network of mobile, decentralized, and self-organized nodes with limited energy and bandwidth resources. The MANET environment is vulnerable to dangerous attacks, such as flooding-based attacks, which paralyze the functionality of the whole network. This paper introduces a hybrid intelligent algorithm, which can meet the challenge of protecting MANET with effective security and network performance. This objective is fulfilled by inspiring the abstract anomaly detection of dendritic cells (DCs) in the human immune system and the accurate decision-making functionality of fuzzy logic theory to introduce a dendritic Cell Fuzzy Algorithm (DCFA). DCFA combines the relevant features of danger theory-based AISs and fuzzy logic theory-based systems. DCFA is verified using QualNet v5.0.2 to detect resource consumption attack. The results show the efficient capability of DCFA to perform the detection operation with high network and security performance.",
keywords = "artificial immune system, danger theory, fuzzy logic theory, mobile ad hoc network, resource consumption attack",
author = "Maha Abdelhaq and Raed Alsaqour and Mahamod Ismail and Shawkat Abdelhaq",
year = "2015",
month = "10",
day = "28",
doi = "10.1109/ISMS.2015.36",
language = "English",
isbn = "9781479982578",
volume = "2015-October",
pages = "64--69",
booktitle = "Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS",
publisher = "IEEE Computer Society",

}

TY - GEN

T1 - Dendritic Cell Fuzzy Logic Algorithm over Mobile Ad Hoc Networks

AU - Abdelhaq, Maha

AU - Alsaqour, Raed

AU - Ismail, Mahamod

AU - Abdelhaq, Shawkat

PY - 2015/10/28

Y1 - 2015/10/28

N2 - A mobile ad hoc network (MANET) is an open wireless network of mobile, decentralized, and self-organized nodes with limited energy and bandwidth resources. The MANET environment is vulnerable to dangerous attacks, such as flooding-based attacks, which paralyze the functionality of the whole network. This paper introduces a hybrid intelligent algorithm, which can meet the challenge of protecting MANET with effective security and network performance. This objective is fulfilled by inspiring the abstract anomaly detection of dendritic cells (DCs) in the human immune system and the accurate decision-making functionality of fuzzy logic theory to introduce a dendritic Cell Fuzzy Algorithm (DCFA). DCFA combines the relevant features of danger theory-based AISs and fuzzy logic theory-based systems. DCFA is verified using QualNet v5.0.2 to detect resource consumption attack. The results show the efficient capability of DCFA to perform the detection operation with high network and security performance.

AB - A mobile ad hoc network (MANET) is an open wireless network of mobile, decentralized, and self-organized nodes with limited energy and bandwidth resources. The MANET environment is vulnerable to dangerous attacks, such as flooding-based attacks, which paralyze the functionality of the whole network. This paper introduces a hybrid intelligent algorithm, which can meet the challenge of protecting MANET with effective security and network performance. This objective is fulfilled by inspiring the abstract anomaly detection of dendritic cells (DCs) in the human immune system and the accurate decision-making functionality of fuzzy logic theory to introduce a dendritic Cell Fuzzy Algorithm (DCFA). DCFA combines the relevant features of danger theory-based AISs and fuzzy logic theory-based systems. DCFA is verified using QualNet v5.0.2 to detect resource consumption attack. The results show the efficient capability of DCFA to perform the detection operation with high network and security performance.

KW - artificial immune system

KW - danger theory

KW - fuzzy logic theory

KW - mobile ad hoc network

KW - resource consumption attack

UR - http://www.scopus.com/inward/record.url?scp=84959298406&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84959298406&partnerID=8YFLogxK

U2 - 10.1109/ISMS.2015.36

DO - 10.1109/ISMS.2015.36

M3 - Conference contribution

AN - SCOPUS:84959298406

SN - 9781479982578

VL - 2015-October

SP - 64

EP - 69

BT - Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS

PB - IEEE Computer Society

ER -