An Immunology Inspired Flow Control Attack Detection Using Negative Selection with R-Contiguous Bit Matching for Wireless Sensor Networks

Wireless sensor networks (WSNs) due to their deployment in open and unprotected environments become suspected to attacks. Most of the resource exhaustion occurs as a result of attacking the data flow control thus creating challenges for the security of WSNs. An Anomaly Detection System (ADS) framework inspired from the Human Immune System is implemented in this paper for detecting Sybil attacks in WSNs. This paper implemented an improved, decentralized, and customized version of the Negative Selection Algorithm (NSA) for data flow anomaly detection with learning capability. The use of R-contiguous bit matching, which is a light-weighted bit matching technique, has reduced holes in the detection coverage. This paper compares the Sybil attack detection performance with three algorithms in terms of false negative, false positive, and detection rates. The higher detection, and lower false positive and false negative rates of the implemented technique due to the R-contiguous bit matching technique used in NSA improve the performance of the proposed framework. The work has been tested in Omnet++ against Sybil attacks for WSNs.

[1]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.

[2]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Anastasios A. Economides,et al.  ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks , 2014, EURASIP J. Inf. Secur..

[4]  Peter J. Bentley,et al.  Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.

[5]  Jean-Yves Le Boudec,et al.  An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks , 2004, BioADIT.

[6]  Hossein Pedram,et al.  A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents , 2009, 2009 International Conference on Computational Intelligence and Security.

[7]  Julie Greensmith,et al.  Greensmith, Julie and Aickelin, Uwe and Cayzer, Steve (2005) 'Introducing Dendritic Cells as a Novel Immune- Inspired Algorithm for Anomaly Detection'. In: ICARIS- , 2017 .

[8]  Hosam Soleman,et al.  SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS , 2014 .

[9]  Jonathan Loo,et al.  Artificial Neural Network Based Detection of Energy Exhaustion Attacks in Wireless Sensor Networks Capable of Energy Harvesting , 2014, Ad Hoc Sens. Wirel. Networks.

[10]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[11]  Jean-Yves Le Boudec,et al.  An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..

[12]  Shahaboddin Shamshirband,et al.  Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[13]  Ali Miri,et al.  A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[14]  Peter J. Bentley,et al.  Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.

[15]  Guang-Zhong Yang,et al.  From computers to ubiquitous computing by 2010: health care , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[16]  Vasos Vassiliou,et al.  An Intrusion Detection System for Wireless Sensor Networks , 2017, 2017 24th International Conference on Telecommunications (ICT).

[17]  Jie Wu,et al.  Control Frame Shaping in Power Controlled and Directional MAC Protocols? , 2008, Ad Hoc Sens. Wirel. Networks.

[18]  Julie Greensmith,et al.  Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems , 2010, ArXiv.

[19]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[20]  Fengqi Yu,et al.  Immunity-based intrusion detection for wireless sensor networks , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[21]  R. S. Bhuvaneswaran,et al.  DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHOD , 2014 .

[22]  Azween Abdullah,et al.  An Energy Efficient Color Based Topology Control Algorithm for Wireless Sensor Networks , 2013 .

[23]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[24]  S. Nishanthi Intrusion Detection in Wireless Sensor Networks Using Watchdog Based Clonal Selection Algorithm , 2013 .

[25]  Jaime Lloret,et al.  Bio-Inspired Mechanisms in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[26]  Jonathan Timmis,et al.  An interdisciplinary perspective on artificial immune systems , 2008, Evol. Intell..

[27]  Lu Hong,et al.  Danger theory of immune systems and intrusion detection systems , 2009, 2009 International Conference on Industrial Mechatronics and Automation.

[28]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[29]  Mohammad Reza Ahmadi,et al.  An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP) , 2009, Int. J. Netw. Secur..