Title | ||
---|---|---|
Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm |
Abstract | ||
---|---|---|
There is a list of unique immune features that are currently absent from the existing artificial immune systems and other intelligent paradigms. We argue that some of AIS features can be inherent in an application itself, and thus this type of application would be a more appropriate substrate in which to develop and integrate the benefits brought by AIS. We claim here that sensor networks are such an application area, in which the ideas from AIS can be readily applied. The objective of this paper is to illustrate how closely a Danger Theory based AIS – in particular the Dendritic Cell Algorithm matches the structure and functional requirements of sensor networks. This paper also introduces a new sensor network attack called an Interest Cache Poisoning Attack and discusses how the DCA can be applied to detect this attack. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1007/11823940_30 | ICARIS |
Keywords | Field | DocType |
new sensor network attack,ais feature,dendritic cell algorithm,interest cache poisoning attack,danger theory,application area,sensor network,existing artificial immune system,appropriate substrate,malicious activity,unique immune feature,innate immunity,sensor networks,artificial immune system,artificial immune systems,anomaly detection | Anomaly detection,Functional requirement,Artificial immune system,Computer science,Sensor array,Ubiquitous computing,Intrusion detection system,Wireless sensor network,Distributed computing,DNS spoofing | Conference |
Volume | ISSN | ISBN |
4163 | 0302-9743 | 3-540-37749-2 |
Citations | PageRank | References |
32 | 1.61 | 12 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jungwon Kim | 1 | 522 | 32.96 |
Peter Bentley | 2 | 34 | 2.85 |
Christian Wallenta | 3 | 53 | 2.54 |
Mohamed H. Ahmed | 4 | 1935 | 119.39 |
Stephen Hailes | 5 | 1646 | 144.87 |