Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques

被引:42
作者
Salmon, Helio [1 ]
de Farias, Claudio [1 ]
Loureiro, Paula [1 ,2 ]
Pirmez, Luci [1 ,3 ,4 ]
Rossetto, Silvana [1 ,2 ]
Rodrigues, Paulo [1 ]
Pirmez, Rodrigo
Delicato, Flavia [5 ]
da Costa Carmo, Luiz [6 ]
机构
[1] Univ Fed Rio de Janeiro, Programa Posgrad Informat, Rio De Janeiro, RJ, Brazil
[2] Univ Fed Rio de Janeiro, Comp Sci, Rio De Janeiro, RJ, Brazil
[3] Univ Fed Rio de Janeiro, Inst Informat, Rio De Janeiro, RJ, Brazil
[4] Univ Fed Rio de Janeiro, Fac Med, BR-21941901 Rio De Janeiro, RJ, Brazil
[5] Univ Fed Rio Grande do Norte, Dept Informat & Matemat Aplicada, BR-59078970 Natal, RN, Brazil
[6] Inst Nacl Metrol Normalizacao & Qualidade Ind, BR-25250020 Duque De Caxias, RJ, Brazil
关键词
Wireless sensor networks; Intrusion Detection System; Artificial immune inspired system; Denial-of-sleep attack;
D O I
10.1007/s10776-012-0179-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
An IDS framework inspired in the Human Immune System to be applied in the wireless sensor network context is proposed. It uses an improved decentralized and customized version of the Dendritic Cell Algorithm, which allows nodes to monitor their neighborhood and collaborate to identify an intruder. The work was implemented and tested both in simulation and in real sensor platform scenarios, comparing them to each other and was also compared to a Negative Selection Theory implementation in order to demonstrate its efficiency in detecting a denial-of-sleep attack and in energy consumption. Results demonstrated the success of the proposal.
引用
收藏
页码:39 / 66
页数:28
相关论文
共 25 条
[1]  
Aickelin U., 2003, INTRO TUTORIALS OPTI
[2]  
Aickelin U, 2002, P 1 INT C ART IMM SY, P141, DOI DOI 10.2139/SSRN.2832054
[3]  
Bachmayer S., 2008, ARTIFICIAL IMMUNE SY
[4]  
Barbosa A., 2000, INTRUSION DETECTION
[5]  
CROSSBOW, CROSSB TECHN
[6]  
da Silva Ana, 2005, P 1 ACM INT WORKSH Q
[7]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[8]   On the Lifetime of Wireless Sensor Networks [J].
Dietrich, Isabel ;
Dressler, Falko .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (01)
[9]   AIS for misbehavior detection in wireless sensor networks: Performance and design principles [J].
Drozda, Martin ;
Schaust, Sven ;
Szczerbicka, Helena .
2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, :3719-3726
[10]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28