Abstract
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System—in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor network. The method is validated using two separate implementations: a simulation using J-sim and an implementation for the T-mote Sky sensor using TinyOS. This paper also introduces a new sensor network attack called an Interest Cache Poisoning Attack and investigates how the DCA can be applied to detect this attack in a series of experiments.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Matzinger P (1994) Tolerance, danger and the extended family. Annu Rev Immunol 12:991–1045
Aickelin U., Bentley P., Cayzer S, Kim J, McLeod J (2003) Danger theory: the link between AIS and IDS. In: Proceedings of the 2nd international conference on AIS (ICARIS-03), pp 147–155
Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for intrusion detection. In: Proceedings of ICARIS-05. Springer, Berlin, pp 153–167
Greensmith J, Twycross J, Aickelin U (2006) Dendritic cells for anomaly detection. In: Proceedings of IEEE congress on evolutionary computation (CEC-06), Vancouver, Canada
Bentley P, Greensmith J, Ujjin S (2005) Two ways to grow tissue for AIS. In: Proceedings of the 3rd international conference on AIS (ICARIS-05). Springer, Berlin, pp 139–152
Kim J, Wilson W, Aickelin U, McLeod J (2005) Cooperative automated worm response and detection ImmuNe algorithm (CARDINAL) inspired by T-cell immunity and tolerance. In: Proceedings of the 3rd international conference on AIS (ICARIS-05), pp 168–181
Twycross J, Aickelin U (2005) Towards a conceptual framework for innate immunity. In: Proceedings of the 3rd international conference on AIS (ICARIS-05). Springer, Berlin, pp 153–167
Twycross J, Aickelin U (2006) LIBTISSUE—implementing innate immunity. In: Proceedings of the CEC-06, Vancouver, Canada
Sarafijanovic S, Le Boudec J (2005) An AIS for misbehaviour detection in mobile ad-hoc networks with virtual thymus, clustering, danger signals and memory detectors. In: Proceedings of the 2nd international conference on AIS (ICARIS-04). Springer, Berlin, pp 342–356
Greensmith J et al (2006) Articulation and clarification of the dendritic cell algorithm. In: Proceedings of ICARIS-2006
Intanagonwiwat C et al. (2003) Directed diffusion for wireless sensor networking. IEEE/ACM Trans Netw 11(1):2–16
Akyildiz IF et al (2002) A survey on sensor networks. IEEE Commun Mag August:102–114
Estrin D, Cullar D, Pister K, Sukhatme G (2002) Connecting the physical world with pervasive networks. In: Pervasive computing, pp 59–69
Karlof C, Wagner D (2004) Secure routing in wireless sensor networks: attacks and countermeasures. In: Ad hoc networks, pp 293–315
Wallenta C (2006) Detecting malicious activities in directed diffusion based sensor networks. Diploma thesis, System Architecture Group, Department of Computer Science, Universität Karlsruhe
Mati S, Giuli T, Lai K, Baker M (2000) Mitigating routing misbehaviour in mobile ad hoc networks
Lioy A, Maino F, Marian M, Mazzocchi D (2000) In: DNS security, TERENA networking conference
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wallenta, C., Kim, J., Bentley, P.J. et al. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. Appl Intell 32, 1–26 (2010). https://doi.org/10.1007/s10489-008-0132-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-008-0132-0