skip to main content
10.1145/2739480.2754816acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

Securing the Internet of Things with Responsive Artificial Immune Systems

Published:11 July 2015Publication History

ABSTRACT

The Internet of Things is a network of `smart' objects, transforming everyday objects into entities which can measure, sense and understand their environment. The devices are uniquely identifiable, rely on near field connectivity, often in embedded devices. The Internet of Things is designed to be deployed without human intervention or interaction. One application is the `smart house', with components including household appliances, networked with the user able to control devices remotely. However, the security inherent in these systems is added as somewhat of an afterthought. One hypothetical scenario is where a malicious party could exploit this technology with potentially disastrous consequences, turning on a cooker remotely leading to digital arson. Reliance on standard methods is insufficient to provide the user with adequate levels of security, an area where AIS may be extremely useful. There are currently limitations with AIS applied in security, focussing on detection without providing automatic responses. This problem provides an opportunity to advance AIS in providing both an ideal scenario for testing their real-world application and to develop novel responsive AIS. A responsive version of the deterministic Dendritic Cell Algorithm will be proposed to demonstrate how responsive AIS will need to be developed to meet these future challenges through proposing the incorporation of a model of T-cell responses.

References

  1. U. Aickelin and S. Cayzer. The danger theory and its application to artificial immune systems. In Proceedings of the 1st International Conference on ARtificial Immune Systems (ICARIS 2002), Canterbury, UK, pages 141--148, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  2. R. Chen, C. Liu, and L. Xiao. A security situation sense model based on artificial immune system in the internet of things. Advanced Materials Research, 403--408:2457--2460, 2012.Google ScholarGoogle Scholar
  3. I. R. Cohen. Real and artificial immune systems: computing the state of the body. Nat Rev Immunol, 07(07):569--574, 07 2007.Google ScholarGoogle ScholarCross RefCross Ref
  4. L. N. de Castro and F. J. Von Zuben. Immune and neural network models: theoretical and empirical comparisons. International Journal of Computational Intelligence and Applications, 1(3):239--257, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  5. L. N. De Castro and F. J. Von Zuben. Learning and optimization using the clonal selection principle. Evolutionary Computation, IEEE Transactions on, 6(3):239--251, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. I. Dent, T. Craig, U. Aickelin, and T. Rodden. Variability of behaviour in electricity load profile clustering; who does things at the same time each day? In P. Perner, editor, Advances in Data Mining, volume 8557 of Lecture Notes in Computer Science, pages 70--84, Heidelberg, 2014. Springer.Google ScholarGoogle Scholar
  7. Y. Ding, Y. Jin, L. Ren, and K. Hao. An intelligent self-organisation scheme for the internet of things. IEEE Computational Intelligence Magazine, pages 41--53, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. L. Fanelli. A hybrid model for immune inspired network intrusion detection. In Artificial Immune Systems, pages 107--118. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Forrest, S. A. Hofmeyr, and A. Somayaji. Computer immunology. Commun. ACM, 40(10):88--96, Oct. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Greensmith. The Dendritic Cell Algorithm. PhD thesis, University of Nottingham, 2007.Google ScholarGoogle Scholar
  11. F. Gu, J. Greensmith, and U. Aickelin. Theoretical formulation and analysis of the deterministic dendritic cell algorithm. Biosystems, 111 (2):127--135, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  12. S. A. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evolutionary computation, 8(4):443--473, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. http://www.economist.com/news/special-report/21606420-perils-connected-devices%-home-hacked home.Google ScholarGoogle Scholar
  14. http://www.hivehome.com.Google ScholarGoogle Scholar
  15. G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy. Smart objects as building blocks for the internet of things,. IEEE Internet Computing, 14(1):44--51, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Matzinger. Tolerance, danger, and the extended family. Annual review of immunology, 12(1):991--1045, 1994.Google ScholarGoogle Scholar
  17. C. M. Medaglia and A. Serbanati. An overview of privacy and security issues in the internet of things. The Internet of Things, pages pp 389--395, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  18. H. Ning and H. Liu. Cyber-physical-social based security architecture for future internet of things. Advances in Internet of Things, 2:1--7, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  19. M. Roesch. Snort: Lightweight intrusion detection for networks. In LISA, volume 99, pages 229--238, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. Stibor, J. Timmis, and C. Eckert. A comparative study of real-valued negative selection to statistical anomaly detection techniques. In Artificial Immune Systems, pages 262--275. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. V. Sutavani, R. G. Bradley, J. M. Ramage, A. M. Jackson, L. G. Durrant, and I. Spendlove. Cd55 costimulation induces differentiation of a discrete t regulatory type 1 cell population with a stable phenotype. The Journal of Immunology, 191(12):5895--5903, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  22. J. Timmis. Artificial immune systems--today and tomorrow. Natural Computing, 6(1):1--18, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Weber. Internet of things -- new security and privacy challenges. Computer Law and Security Review, 26(1):23--30, 2010.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Securing the Internet of Things with Responsive Artificial Immune Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GECCO '15: Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation
          July 2015
          1496 pages
          ISBN:9781450334723
          DOI:10.1145/2739480

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 July 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          GECCO '15 Paper Acceptance Rate182of505submissions,36%Overall Acceptance Rate1,669of4,410submissions,38%

          Upcoming Conference

          GECCO '24
          Genetic and Evolutionary Computation Conference
          July 14 - 18, 2024
          Melbourne , VIC , Australia

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader