ABSTRACT
The Internet of Things is a network of `smart' objects, transforming everyday objects into entities which can measure, sense and understand their environment. The devices are uniquely identifiable, rely on near field connectivity, often in embedded devices. The Internet of Things is designed to be deployed without human intervention or interaction. One application is the `smart house', with components including household appliances, networked with the user able to control devices remotely. However, the security inherent in these systems is added as somewhat of an afterthought. One hypothetical scenario is where a malicious party could exploit this technology with potentially disastrous consequences, turning on a cooker remotely leading to digital arson. Reliance on standard methods is insufficient to provide the user with adequate levels of security, an area where AIS may be extremely useful. There are currently limitations with AIS applied in security, focussing on detection without providing automatic responses. This problem provides an opportunity to advance AIS in providing both an ideal scenario for testing their real-world application and to develop novel responsive AIS. A responsive version of the deterministic Dendritic Cell Algorithm will be proposed to demonstrate how responsive AIS will need to be developed to meet these future challenges through proposing the incorporation of a model of T-cell responses.
- U. Aickelin and S. Cayzer. The danger theory and its application to artificial immune systems. In Proceedings of the 1st International Conference on ARtificial Immune Systems (ICARIS 2002), Canterbury, UK, pages 141--148, 2002.Google ScholarCross Ref
- R. Chen, C. Liu, and L. Xiao. A security situation sense model based on artificial immune system in the internet of things. Advanced Materials Research, 403--408:2457--2460, 2012.Google Scholar
- I. R. Cohen. Real and artificial immune systems: computing the state of the body. Nat Rev Immunol, 07(07):569--574, 07 2007.Google ScholarCross Ref
- L. N. de Castro and F. J. Von Zuben. Immune and neural network models: theoretical and empirical comparisons. International Journal of Computational Intelligence and Applications, 1(3):239--257, 2001.Google ScholarCross Ref
- L. N. De Castro and F. J. Von Zuben. Learning and optimization using the clonal selection principle. Evolutionary Computation, IEEE Transactions on, 6(3):239--251, 2002. Google ScholarDigital Library
- I. Dent, T. Craig, U. Aickelin, and T. Rodden. Variability of behaviour in electricity load profile clustering; who does things at the same time each day? In P. Perner, editor, Advances in Data Mining, volume 8557 of Lecture Notes in Computer Science, pages 70--84, Heidelberg, 2014. Springer.Google Scholar
- Y. Ding, Y. Jin, L. Ren, and K. Hao. An intelligent self-organisation scheme for the internet of things. IEEE Computational Intelligence Magazine, pages 41--53, 2013. Google ScholarDigital Library
- R. L. Fanelli. A hybrid model for immune inspired network intrusion detection. In Artificial Immune Systems, pages 107--118. Springer, 2008. Google ScholarDigital Library
- S. Forrest, S. A. Hofmeyr, and A. Somayaji. Computer immunology. Commun. ACM, 40(10):88--96, Oct. 1997. Google ScholarDigital Library
- J. Greensmith. The Dendritic Cell Algorithm. PhD thesis, University of Nottingham, 2007.Google Scholar
- F. Gu, J. Greensmith, and U. Aickelin. Theoretical formulation and analysis of the deterministic dendritic cell algorithm. Biosystems, 111 (2):127--135, 2013.Google ScholarCross Ref
- S. A. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evolutionary computation, 8(4):443--473, 2000. Google ScholarDigital Library
- http://www.economist.com/news/special-report/21606420-perils-connected-devices%-home-hacked home.Google Scholar
- http://www.hivehome.com.Google Scholar
- G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy. Smart objects as building blocks for the internet of things,. IEEE Internet Computing, 14(1):44--51, 2009. Google ScholarDigital Library
- P. Matzinger. Tolerance, danger, and the extended family. Annual review of immunology, 12(1):991--1045, 1994.Google Scholar
- C. M. Medaglia and A. Serbanati. An overview of privacy and security issues in the internet of things. The Internet of Things, pages pp 389--395, 2010.Google ScholarCross Ref
- H. Ning and H. Liu. Cyber-physical-social based security architecture for future internet of things. Advances in Internet of Things, 2:1--7, 2012.Google ScholarCross Ref
- M. Roesch. Snort: Lightweight intrusion detection for networks. In LISA, volume 99, pages 229--238, 1999. Google ScholarDigital Library
- T. Stibor, J. Timmis, and C. Eckert. A comparative study of real-valued negative selection to statistical anomaly detection techniques. In Artificial Immune Systems, pages 262--275. Springer, 2005. Google ScholarDigital Library
- R. V. Sutavani, R. G. Bradley, J. M. Ramage, A. M. Jackson, L. G. Durrant, and I. Spendlove. Cd55 costimulation induces differentiation of a discrete t regulatory type 1 cell population with a stable phenotype. The Journal of Immunology, 191(12):5895--5903, 2013.Google ScholarCross Ref
- J. Timmis. Artificial immune systems--today and tomorrow. Natural Computing, 6(1):1--18, 2007. Google ScholarDigital Library
- R. Weber. Internet of things -- new security and privacy challenges. Computer Law and Security Review, 26(1):23--30, 2010.Google ScholarCross Ref
Index Terms
- Securing the Internet of Things with Responsive Artificial Immune Systems
Recommendations
Authentication Protocol for Securing Internet of Things
ICEMIS '18: Proceedings of the Fourth International Conference on Engineering & MIS 2018The Internet of things (IoT) is become an important research topic because it integrates various sensors and objects to communicate directly with one another object without human intervention. Today, Internet of Things has so many applications in our ...
Innate immune memory and its application to artificial immune systems
AbstractThe study of innate immune-based algorithms is an important research domain in Artificial Immune System (AIS), such as Dendritic Cell Algorithm (DCA), Toll-Like Receptor algorithm (TLRA). The parameters in these algorithms usually require either ...
Threat-Based Security Analysis for the Internet of Things
SIOT '14: Proceedings of the 2014 International Workshop on Secure Internet of ThingsThe Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. This technology is anticipated to become an integral milestone in the development of smart homes and smart cities. ...
Comments