Skip to main content

Advertisement

Log in

Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

An IDS framework inspired in the Human Immune System to be applied in the wireless sensor network context is proposed. It uses an improved decentralized and customized version of the Dendritic Cell Algorithm, which allows nodes to monitor their neighborhood and collaborate to identify an intruder. The work was implemented and tested both in simulation and in real sensor platform scenarios, comparing them to each other and was also compared to a Negative Selection Theory implementation in order to demonstrate its efficiency in detecting a denial-of-sleep attack and in energy consumption. Results demonstrated the success of the proposal.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. U. Aickelin and S. Cayzer, The danger theory and its application to artificial immune systems, 1st International Conference on Artificial Immune Systems, Canterbury, pp. 141–148, 2002.

  2. U. Aickelin, Artificial immune system and intrusion detection tutorial, Introductory Tutorials in Optimization, Search and Decision Support Methodologies, Nottingham, UK, 2003.

  3. S. Bachmayer, Artificial Immune Systems, Department of Computer Science, University of Helsinki, Helsinki, 2008.

  4. A. Barbosa, Intrusion Detection Systems—Seminaries Ravel—CPS760, 2000, http://www.lockabit.coppe.ufrj.br/downloads/academicos/IDS.pdf.

  5. CROSSBOW, Crossbow Technology, http://www.xbow.com/, Accessed April, 2010.

  6. A. Da Silva et al., Decentralized intrusion detection in wireless sensor networks, Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, New York, 2005.

  7. H. Debar, et al., Towards a taxonomy of intrusion-detection systems, Computer Networks, Vol. 31, pp. 805–822, 1999.

    Article  Google Scholar 

  8. I. Dietrich and F. Dressler, On the lifetime of wireless sensor networks, ACM Transactions on Sensor Networks, Vol. 5, No. 1, pp. 1–39, 2009.

    Article  Google Scholar 

  9. M. Drozda et al., AIS for misbehavior detection in wireless sensor networks: performance and design principles, IEEE Congress on Evolutionary Computation, Singapore, pp. 3719–3726, 2007.

  10. P. García-Teodoro, et al., Anomaly-based network intrusion detection: techniques, systems and challenges, Computers & Security, Vol. 28, pp. 18–28, 2008.

    Article  Google Scholar 

  11. J. Greensmith, The dendritic cell algorithm, PhD thesis, University of Nottingham, 2007.

  12. J. Greensmith et al., Detecting danger: applying a novel immunological concept to intrusion detection systems, 4th International Conference on Artificial Immune Systems (ICARIS-05), 2005.

  13. L. Hong and J. Yang, Danger theory of immune systems and intrusion detection systems, International Conference on Industrial Mechatronics and Automation, Chengdu, pp. 208–211, 2009.

  14. J. Kim et al., Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm, Artificial Immune Systems, Vol. 4163, Springer, Berlin, pp. 390–403, 2006.

  15. P. Levis and D. Gay, TinyOS Programming, Cambridge University PressCambridge, 2009.

    Book  Google Scholar 

  16. Y. Liu and F. Yu, Immunity-based intrusion detection for wireless sensor networks, Neural Networks, IJCNN, pp. 439–444, 2008.

  17. D. Martynov et al., Design and implementation of an intrusion detection system for wireless sensor networks, IEEE International Conference on Electro/Information Technology, Chicago, pp. 507–512, 2007.

  18. P. Matzinger, The danger model: a renewed sense of self, Science, Vol. 296, No. 5566, pp. 301–305, 2002.

    Article  Google Scholar 

  19. I. Onat and A. MIRI, An intrusion detection system for wireless sensor networks, Proceeding of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol. 3, Canada, pp. 253–259, 2005.

  20. R. Roman et al., Applying intrusion detection systems to wireless sensor networks, 3rd Consumer Communications and Networking Conference, Vol. 1, pp. 640–644, 2006.

  21. G. Silva, Intrusion detection in computer networks: immune-inspired algorithm based in the danger theory and the dendritic cells, Master Thesis, Federal University of Minas Gerais, March 2009.

  22. J. Twycross, Immune Systems, Danger Theory and Intrusion Detection, University of NottinghamNottingham, 2004.

    Google Scholar 

  23. C. Wallenta, et al., Detecting interest cache poisoning in sensor networks using an artificial immune algorithm, Applied Intelligence, Vol. 32, No. 1, pp. 1–26, 2010.

    Article  Google Scholar 

  24. W. Xu et al., The feasibility of launching and detecting jamming attacks in wireless networks, 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, pp. 46–57, 2005.

  25. M. Zamani et al., A DDoS-Aware IDS model based on danger theory and mobile agents, Proceedings of the 2009 International Conference on Computational Intelligence and Security, Vol. 1, 2009.

Download references

Acknowledgments

This work is partly supported by the National Council for Scientific and Technological Development (CNPq) through processes 481638/2007-5 for Luci Pirmez and Flávia C. Delicato; 4781174/2010-1 and 309270/2009-0 for Luci Pirmez; 311363/2011-3, 470586/2011-7 and 201090/2009-0 for Flávia C. Delicato; 480359/2009-1 and 311515/2009-6 for Paulo F. Pires; by the Financier of Studies and Projects (FINEP) through processes 01.10.0549.00 and 01.10.0064.00 for Luci Pirmez; and by the Foundation for Research of the State of Rio de Janeiro (FAPERJ) through processes E26/101.360/2010 for Luci Pirmez; E-26/100.428/2010 for Claudio M. de Farias.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Claudio M. de Farias.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Salmon, H.M., de Farias, C.M., Loureiro, P. et al. Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques. Int J Wireless Inf Networks 20, 39–66 (2013). https://doi.org/10.1007/s10776-012-0179-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-012-0179-z

Keywords

Navigation