An Immune Middleware for Embedded System

With embedded system being used in every corner of military and civil electronic industries, its security problem is prominent. Inspired by the natural immune system, the paper proposes an immune middleware to prevent embedded system from misacting when net intrusion or inner mistake happens. Firstly a flexible bus that has three-layer architecture is presented to help the embedded system acquire compatibility, multi- functionality and standardization. Then based on this multiplayer bus architecture, the middleware evolved from the concept of antigen and antibody is proposed. The design principle, the immune strategy, the architecture and the working flow of the immune middleware are introduced in detail afterwards. Finally an experimental case demonstrates the validity of the proposed method.

[1]  Yee Wei Law,et al.  How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[2]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[3]  Ahmad-Reza Sadeghi,et al.  Towards multilaterally secure computing platforms - with open source and trusted computing , 2005, Inf. Secur. Tech. Rep..

[4]  Lianying Zhou,et al.  Research on computer network security based on pattern recognition , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[5]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[6]  Harald Vogt,et al.  Intrusion Detection and Failure Recovery in Sensor Nodes , 2005, GI Jahrestagung.

[7]  Ali Miri,et al.  An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[8]  David E. Bakken,et al.  A configurable cryptography subsystem in a middleware framework for embedded systems , 2004, Comput. Networks.

[9]  Anastasia Pagnoni,et al.  An innate immune system for the protection of computer networks , 2005 .

[10]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[11]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[12]  Fumio Mizoguchi,et al.  Design of security system based on immune system , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.

[13]  Srivaths Ravi,et al.  Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.

[14]  Trent Jaeger,et al.  Secure coprocessor-based intrusion detection , 2002, EW 10.

[15]  Philip Koopman Embedded System Security , 2004, Computer.

[16]  Fan Hong,et al.  Network Based Immunization Against Computer Virus , 2006, 2006 Japan-China Joint Workshop on Frontier of Computer Science and Technology.

[17]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[18]  Judith Kelner,et al.  Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[19]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.