Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology

The Internet of Things (IoT) confronts a complicated and changeful attack environment. It is necessary to evaluate the security risk of IoT dynamically to judge the situation of IoT. To resolve the above problem, a dynamical risk assessment method for IoT inspired by Artificial Immune System is proposed in this paper. The proposed method is made up of Detection Agent of Attack and Sub-system of Dynamical Risk Assessment. Furthermore, it adopts the technology of detector distribution. The simulation of immune principles and mechanisms in the real IoT environment is deduced by set theory in math. The attack detector evolves dynamically in the IoT immune environment. Its change forms the dynamical security risk value of IoT.

[1]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[2]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[3]  Xiao Ren Artificial Immune System: Principle, Models, Analysis and Perspectives , 2002 .

[4]  A. Karygicmnis,et al.  RFID Security: A Taxonomy of Risk , 2006, 2006 First International Conference on Communications and Networking in China.

[5]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Aikaterini Mitrokotsa,et al.  Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.

[7]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[8]  Sencun Zhu,et al.  Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[9]  Tao Li,et al.  An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.

[10]  Sheng-Yuan Wang,et al.  Survey of Information Security Risk Assessment , 2010, 2010 International Conference on Electrical and Control Engineering.

[11]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[12]  M. Eloff,et al.  Internet of things: emerging and future scenarios from an information security perspective , 2009 .

[13]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[14]  Vladimir Oleshchuk,et al.  Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[15]  Jacky Hartnett,et al.  Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .

[16]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[17]  Zhang Yu-qing Survey of information security risk assessment , 2004 .

[18]  Song Chen A Real-Time Method of Risk Evaluation Based on ArtificialImmune System for Network Security , 2005 .