nauman mazhar - Academia.edu (original) (raw)
Papers by nauman mazhar
Journal of Software: Evolution and Process
Pak. J. Engg. & Appl. Sci, 2010
MANET is characterised by a set of mobile nodes in an inherently insecure environment, having lim... more MANET is characterised by a set of mobile nodes in an inherently insecure environment, having limited battery capacities. Provisioning of energy efficient security in MANETs is, therefore, an open problem for which a number of solutions have been proposed. In this paper, we present an overview and comparison of the MANET security at routing layer by using the cryptographic and Artificial Immune System (AIS) approaches. The BeeAdHoc protocol, which is a Bio-inspired MANET routing protocol based on the foraging principles of honey bee colony, is taken as case study. We carry out an analysis of the three security frameworks that we have proposed earlier for securing BeeAdHoc protocol; one based on asymmetric key encryption, i.e BeeSec, and the other two using the AIS approach, i.e BeeAIS based on self non-self discrimination from adaptive immune system and BeeAIS-DC based on Dendritic Cell (DC) behavior from innate immune system. We extensively evaluate the performance of the three protocols through network simulations in ns-2 and compare with BeeAdHoc, the base protocol, as well as with state-of-the-art MANET routing protocols DSR and AODV. Our results clearly indicate that AIS based systems provide security at much lower cost to energy as compared with the cryptographic systems. Moreover, the use of dendritic cells and danger signals instead of the classical self non-self discrimination allows to detect the non-self antigens with greater accuracy. Based on the results of this investigation, we also propose a composite AIS model for BeeAdHoc security by combining the concepts from both the adaptive and the innate immune systems by modelling the attributes and behavior of the B-cells and DCs.
Networking technology has created huge infrastructures of highly integrated systems enabling acce... more Networking technology has created huge infrastructures of highly integrated systems enabling access to sophisticated computing resources. This has, however, made these systems vulnerable to attacks by intruders who have the potential to cause them serious harm. In order to counter this threat, significant research effort has been directed towards developing intrusion detection systems that offer the capability to detect intruders in real time.
2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), 2011
The fundamental characteristic which differentiates MANETs from other wireless or wired networks ... more The fundamental characteristic which differentiates MANETs from other wireless or wired networks is mobility. Therefore, MANET routing protocols are designed to adaptively cater for dynamic changes in topology while maximizing through- put and packet delivery ratio, and minimizing delay, routing load and energy consumption. A major design issue for an efficient and effective routing protocol for real MANETs is, therefore,
2011 Wireless Advanced, 2011
... Analyzing the effect of these constraints on routing performance requires extensive evaluatio... more ... Analyzing the effect of these constraints on routing performance requires extensive evaluation through simulations ... The proactive routing protocols are more difficult to secure as compared toreactive ... Performance analysis of MANET routing protocols in different mobility patterns. ...
Lecture Notes in Computer Science, 2007
... To the best of our knowledge, this is the first attempt to secure a Bio/Nature inspired ... I... more ... To the best of our knowledge, this is the first attempt to secure a Bio/Nature inspired ... In our system, affinity is measured using hamming distance, with cross reactivity threshold ϵ(0 <ϵ<L ... The number of data bits delivered to the applica-tion layer at the destination node in a unit ...
Proceedings of the 9th annual conference on …, 2007
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired rou... more Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past. However, to the best of our knowledge no attempts have been made to ...
Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons:... more Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: (1) mobility results in continuously changing network topology-the premise of stable self or non-self is void, (2) the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile nodes, and (3) the solution should provide high detection accuracy and low false positive rate. The major contribution of this paper is a hybrid AIS model-combining the relevant features of classical self/non-self paradigm with the emerging danger theory paradigm-that has the capability to meet the above-mentioned challenges of the MANET environment. As a case study, we use our hybrid model to develop a power aware security framework for BeeAdHoc-a well-known bio-inspired routing protocol. We have realized our framework in ns-2 simulator. We have also developed an attacker framework in ns-2 that has the capability to launch a number of Byzantine attacks on BeeAdHoc. The results of our experiments show that our proposed framework meets all its requirements: (1) the adaptive learning because of changing self/non-self, (2) high detection accuracy and low false positive rate, (3) lightweight in terms of processing and communication overheads, and (4) better or comparable performance compared with non-secure versions of existing state-of-the-art MANET routing protocols-DSR and AODV. We have also compared our hybrid AIS model with self/non-self, danger theory and a conventional anomaly detection system to show its merits over these schemes. Finally, we propose an extension of the framework for securing DSR.
Proceedings of the 10th annual conference on Genetic and evolutionary computation - GECCO '08, 2008
AIS based intrusion detection systems have traditionally performed self non-self discrimination a... more AIS based intrusion detection systems have traditionally performed self non-self discrimination and suffer from issues such as scalability, false positives, problems with detector generation/holes, need for an initial learning phase, etc. A relatively newer immunological discovery, the Danger Theory, now paves the way for designing more efficient, 2nd generation artificial immune systems. In this paper, we develop a dendritic cell based distributed misbehavior detection system, BeeAIS-DC, for a Bio/Nature inspired MANET routing protocol, BeeAdHoc. In MANETs, the frequent node movements cause the system self to change, thus increasing the rate of false positives. Our proposed system inspires from the danger theory and models the behavior of the dendritic cells to detect the presence or absence of danger to provide a tolerogenic or immunogenic effect. We have implemented our proposed framework, BeeAIS-DC, in network simulator, ns-2, and evaluated its security and network performance. Our results indicate that modelling the dendritic cells allows the BeeAIS-DC to dynamically update its detector set to cater for a changing self due to node mobility, and at the same time provides protection against the routing attacks. The network performance evaluation shows that the AIS overhead of BeeAIS-DC does not cause significant degradation of its performance, which is vital for a battery/bandwidth constrained mobile node.
Journal of Software: Evolution and Process
Pak. J. Engg. & Appl. Sci, 2010
MANET is characterised by a set of mobile nodes in an inherently insecure environment, having lim... more MANET is characterised by a set of mobile nodes in an inherently insecure environment, having limited battery capacities. Provisioning of energy efficient security in MANETs is, therefore, an open problem for which a number of solutions have been proposed. In this paper, we present an overview and comparison of the MANET security at routing layer by using the cryptographic and Artificial Immune System (AIS) approaches. The BeeAdHoc protocol, which is a Bio-inspired MANET routing protocol based on the foraging principles of honey bee colony, is taken as case study. We carry out an analysis of the three security frameworks that we have proposed earlier for securing BeeAdHoc protocol; one based on asymmetric key encryption, i.e BeeSec, and the other two using the AIS approach, i.e BeeAIS based on self non-self discrimination from adaptive immune system and BeeAIS-DC based on Dendritic Cell (DC) behavior from innate immune system. We extensively evaluate the performance of the three protocols through network simulations in ns-2 and compare with BeeAdHoc, the base protocol, as well as with state-of-the-art MANET routing protocols DSR and AODV. Our results clearly indicate that AIS based systems provide security at much lower cost to energy as compared with the cryptographic systems. Moreover, the use of dendritic cells and danger signals instead of the classical self non-self discrimination allows to detect the non-self antigens with greater accuracy. Based on the results of this investigation, we also propose a composite AIS model for BeeAdHoc security by combining the concepts from both the adaptive and the innate immune systems by modelling the attributes and behavior of the B-cells and DCs.
Networking technology has created huge infrastructures of highly integrated systems enabling acce... more Networking technology has created huge infrastructures of highly integrated systems enabling access to sophisticated computing resources. This has, however, made these systems vulnerable to attacks by intruders who have the potential to cause them serious harm. In order to counter this threat, significant research effort has been directed towards developing intrusion detection systems that offer the capability to detect intruders in real time.
2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), 2011
The fundamental characteristic which differentiates MANETs from other wireless or wired networks ... more The fundamental characteristic which differentiates MANETs from other wireless or wired networks is mobility. Therefore, MANET routing protocols are designed to adaptively cater for dynamic changes in topology while maximizing through- put and packet delivery ratio, and minimizing delay, routing load and energy consumption. A major design issue for an efficient and effective routing protocol for real MANETs is, therefore,
2011 Wireless Advanced, 2011
... Analyzing the effect of these constraints on routing performance requires extensive evaluatio... more ... Analyzing the effect of these constraints on routing performance requires extensive evaluation through simulations ... The proactive routing protocols are more difficult to secure as compared toreactive ... Performance analysis of MANET routing protocols in different mobility patterns. ...
Lecture Notes in Computer Science, 2007
... To the best of our knowledge, this is the first attempt to secure a Bio/Nature inspired ... I... more ... To the best of our knowledge, this is the first attempt to secure a Bio/Nature inspired ... In our system, affinity is measured using hamming distance, with cross reactivity threshold ϵ(0 <ϵ<L ... The number of data bits delivered to the applica-tion layer at the destination node in a unit ...
Proceedings of the 9th annual conference on …, 2007
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired rou... more Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past. However, to the best of our knowledge no attempts have been made to ...
Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons:... more Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: (1) mobility results in continuously changing network topology-the premise of stable self or non-self is void, (2) the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile nodes, and (3) the solution should provide high detection accuracy and low false positive rate. The major contribution of this paper is a hybrid AIS model-combining the relevant features of classical self/non-self paradigm with the emerging danger theory paradigm-that has the capability to meet the above-mentioned challenges of the MANET environment. As a case study, we use our hybrid model to develop a power aware security framework for BeeAdHoc-a well-known bio-inspired routing protocol. We have realized our framework in ns-2 simulator. We have also developed an attacker framework in ns-2 that has the capability to launch a number of Byzantine attacks on BeeAdHoc. The results of our experiments show that our proposed framework meets all its requirements: (1) the adaptive learning because of changing self/non-self, (2) high detection accuracy and low false positive rate, (3) lightweight in terms of processing and communication overheads, and (4) better or comparable performance compared with non-secure versions of existing state-of-the-art MANET routing protocols-DSR and AODV. We have also compared our hybrid AIS model with self/non-self, danger theory and a conventional anomaly detection system to show its merits over these schemes. Finally, we propose an extension of the framework for securing DSR.
Proceedings of the 10th annual conference on Genetic and evolutionary computation - GECCO '08, 2008
AIS based intrusion detection systems have traditionally performed self non-self discrimination a... more AIS based intrusion detection systems have traditionally performed self non-self discrimination and suffer from issues such as scalability, false positives, problems with detector generation/holes, need for an initial learning phase, etc. A relatively newer immunological discovery, the Danger Theory, now paves the way for designing more efficient, 2nd generation artificial immune systems. In this paper, we develop a dendritic cell based distributed misbehavior detection system, BeeAIS-DC, for a Bio/Nature inspired MANET routing protocol, BeeAdHoc. In MANETs, the frequent node movements cause the system self to change, thus increasing the rate of false positives. Our proposed system inspires from the danger theory and models the behavior of the dendritic cells to detect the presence or absence of danger to provide a tolerogenic or immunogenic effect. We have implemented our proposed framework, BeeAIS-DC, in network simulator, ns-2, and evaluated its security and network performance. Our results indicate that modelling the dendritic cells allows the BeeAIS-DC to dynamically update its detector set to cater for a changing self due to node mobility, and at the same time provides protection against the routing attacks. The network performance evaluation shows that the AIS overhead of BeeAIS-DC does not cause significant degradation of its performance, which is vital for a battery/bandwidth constrained mobile node.