Abstract
There is a list of unique immune features that are currently absent from the existing artificial immune systems and other intelligent paradigms. We argue that some of AIS features can be inherent in an application itself, and thus this type of application would be a more appropriate substrate in which to develop and integrate the benefits brought by AIS. We claim here that sensor networks are such an application area, in which the ideas from AIS can be readily applied. The objective of this paper is to illustrate how closely a Danger Theory based AIS – in particular the Dendritic Cell Algorithm matches the structure and functional requirements of sensor networks. This paper also introduces a new sensor network attack called an Interest Cache Poisoning Attack and discusses how the DCA can be applied to detect this attack.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)
Akyildiz, I.F., et al.: A Survey on Sensor Networks. IEEE Communication Magazine, 102–114 (August 2002)
Bentley, P.J., Greensmith, J., Ujjin, S.: Two ways to grow tissue for artificial immune systems. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 139–152. Springer, Heidelberg (2005)
Estrin, D., Cullar, D., Pister, K., Sukhatme, G.: Connecting the Physical World with Pervasive Networks. In: Pervasive Computing, pp. 59–69 (2002)
Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)
Greensmith, J., Twycross, J., Aickelin, U.: Dendritic Cells for Anomaly Detection. In: Proc. of IEEE Cong. on Evolutionary Computation (CEC 2006), Vancouver, Canada (2006)
Greensmith, J., Aickelin, U., Twycross, J.: Articulation and clarification of the dendritic cell algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol. 4163, pp. 404–417. Springer, Heidelberg (2006)
Hart, E., Timmis, J.I.: Application Areas of AIS: The Past, The Present and The Future. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 483–497. Springer, Heidelberg (2005)
Intanagonwiwat, C., et al.: Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Trans. on Networking 11(1), 2–16 (2003)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 293–315 (2004)
Kim, J., Wilson, W.O., Aickelin, U., McLeod, J.: Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 168–181. Springer, Heidelberg (2005)
Kim, J., et al.: Immune System Approaches to Intrusion Detection – a Review, under review
Matzinger, P.: Tolerance, danger and the extended family. Annual Reviews in Immunology 12, 991–1045 (1994)
Sarafijanovic, S., Le Boudec, J.: An AIS for misbehaviour detection in mobile ad-hoc networks with virtual thymus, clustering, danger signals and memory detectors. In: Proc. of the 2rd Int. Conf. on AIS (ICARIS). LNCS, pp. 342–356. Springer, Heidelberg (2004)
Twycross, J., Aickelin, U.: Towards a conceptual framework for innate immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 112–125. Springer, Heidelberg (2005)
Twycross, J., Aickelin, U.: Libtissue – implementing innate immunity. In: Proc. of the CEC 2006, Vancouver, Canada (to appear, 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Bentley, P., Wallenta, C., Ahmed, M., Hailes, S. (2006). Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds) Artificial Immune Systems. ICARIS 2006. Lecture Notes in Computer Science, vol 4163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11823940_30
Download citation
DOI: https://doi.org/10.1007/11823940_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37749-8
Online ISBN: 978-3-540-37751-1
eBook Packages: Computer ScienceComputer Science (R0)