Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm
- 622 Downloads
There is a list of unique immune features that are currently absent from the existing artificial immune systems and other intelligent paradigms. We argue that some of AIS features can be inherent in an application itself, and thus this type of application would be a more appropriate substrate in which to develop and integrate the benefits brought by AIS. We claim here that sensor networks are such an application area, in which the ideas from AIS can be readily applied. The objective of this paper is to illustrate how closely a Danger Theory based AIS – in particular the Dendritic Cell Algorithm matches the structure and functional requirements of sensor networks. This paper also introduces a new sensor network attack called an Interest Cache Poisoning Attack and discusses how the DCA can be applied to detect this attack.
KeywordsDanger Theory Artificial Immune Systems Sensor Networks Interest Cache Poisoning Attack
Unable to display preview. Download preview PDF.
- 2.Akyildiz, I.F., et al.: A Survey on Sensor Networks. IEEE Communication Magazine, 102–114 (August 2002)Google Scholar
- 4.Estrin, D., Cullar, D., Pister, K., Sukhatme, G.: Connecting the Physical World with Pervasive Networks. In: Pervasive Computing, pp. 59–69 (2002)Google Scholar
- 6.Greensmith, J., Twycross, J., Aickelin, U.: Dendritic Cells for Anomaly Detection. In: Proc. of IEEE Cong. on Evolutionary Computation (CEC 2006), Vancouver, Canada (2006)Google Scholar
- 10.Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 293–315 (2004)Google Scholar
- 11.Kim, J., Wilson, W.O., Aickelin, U., McLeod, J.: Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 168–181. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 12.Kim, J., et al.: Immune System Approaches to Intrusion Detection – a Review, under reviewGoogle Scholar
- 14.Sarafijanovic, S., Le Boudec, J.: An AIS for misbehaviour detection in mobile ad-hoc networks with virtual thymus, clustering, danger signals and memory detectors. In: Proc. of the 2rd Int. Conf. on AIS (ICARIS). LNCS, pp. 342–356. Springer, Heidelberg (2004)Google Scholar
- 16.Twycross, J., Aickelin, U.: Libtissue – implementing innate immunity. In: Proc. of the CEC 2006, Vancouver, Canada (to appear, 2006)Google Scholar