Study of Immune-Based Intrusion Detection Technology in Wireless Sensor Networks

With the popularity of wireless sensor networks in areas such as military, environmental monitoring, and medical applications, the security problem is increasingly outstanding. The characteristics and constraint conditions of wireless sensor networks such as computing ability, storage space, and battery have brought huge challenges in intrusion detection study. Inspired by the dendritic cell differentiation theory of congenital immune mechanism in biological immune system, this paper put forward a real-time intrusion detection model. The model elaborates the biological differentiation mechanism of dendritic cells. In addition, the model abstracts the dendritic cell information fusion process, defines the meanings and functions of external signals which are applied to wireless sensor networks, and defines the mathematical evolution model of dendritic cells. This paper improves the dendritic cell algorithm, named DCA-RT, which implements the distributed deployment and performs real-time intrusion detection. In this paper, performances of the model are analyzed, including the scalability, robustness, and complexity, and experimental results show that the model has better detection performance and reduces the system energy consumption.

[1]  Huirong Fu,et al.  Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[2]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[3]  Tang Chao-jing Integrated artificial immune system for intrusion detection , 2012 .

[4]  Tang Chao-jing DCA based Data Fusion Method , 2011 .

[5]  Sajal K. Das,et al.  A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[6]  Julie Greensmith,et al.  The Dendritic Cell Algorithm for Intrusion Detection , 2013, Biologically Inspired Networking and Sensing.

[7]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[8]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[9]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[10]  Gu Ji-yan,et al.  The Dendritic Cell Algorithm , 2011 .

[11]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[12]  Feifei Gao,et al.  Accurate and Efficient Node Localization for Mobile Sensor Networks , 2013, Mob. Networks Appl..

[13]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[14]  Chae Hoon Lim LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[15]  Guoliang Xing,et al.  SGF: A state-free gradient-based forwarding protocol for wireless sensor networks , 2009, TOSN.

[16]  Chase Qishi Wu,et al.  Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[17]  Fengqi Yu,et al.  Immunity-based intrusion detection for wireless sensor networks , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[18]  Ma Jian-feng Survey of wireless sensor network security techniques , 2007 .

[19]  Yang Yi-xian Danger theory inspired intrusion detection model for wireless sensor networks , 2012 .

[20]  Julie Greensmith,et al.  Information fusion for anomaly detection with the dendritic cell algorithm , 2010, Inf. Fusion.

[21]  Mei Tao,et al.  Survey on wireless sensors network , 2004 .

[22]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[23]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[24]  Julie Greensmith,et al.  The DCA: SOMe comparison , 2008, Evol. Intell..

[25]  Ali Miri,et al.  An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[26]  Yu Gu,et al.  Mobility-Assisted Node Localization Based on TOA Measurements Without Time Synchronization in Wireless Sensor Networks , 2012, Mob. Networks Appl..

[27]  Hongyang Chen,et al.  An Importance Sampling Method for TDOA-Based Source Localization , 2011, IEEE Transactions on Wireless Communications.

[28]  Hu Yan-jun Wireless Sensor Network Technology , 2006 .

[29]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[30]  T. Basar,et al.  A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[31]  Luci Pirmez,et al.  Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques , 2012, International Journal of Wireless Information Networks.

[32]  Taking Stock of a Discipline , 1983 .

[33]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[34]  Nael B. Abu-Ghazaleh,et al.  A taxonomy of wireless micro-sensor network models , 2002, MOCO.

[35]  Zhou Li-ping Research on Differentiation Model and Application of Dendritic Cells in Artificial Immune System , 2008 .

[36]  D. Dasgupta Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.

[37]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[38]  Bin Wang,et al.  System-level simulation methodology and platform for mobile cellular systems , 2011, IEEE Communications Magazine.

[39]  Suat Ozdemir,et al.  Secure and reliable data aggregation for wireless sensor networks , 2007 .

[40]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[41]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.

[42]  H. Vincent Poor,et al.  Mobile element assisted cooperative localization for wireless sensor networks with obstacles , 2010, IEEE Transactions on Wireless Communications.