Immune Approach to the Protection of IoT Devices

This paper presents an immune approach for securing different types of devices connected to network. This also applies to the technology, called Internet of things (IoT), which growing rapidly from year to year. It was developed to help people in everyday life, to make our life easier. However, such systems of interrelated computing devices with the ability to transfer data over a network is exposed to various types of attacks. Hacker can take the control over the each device connected to the network. As a result, for example, heating system can be switched on at the summer time, a refrigerator do redundant purchases, etc. To fix this problem, we propose to apply our hybrid immune-based algorithm, called b-v model, embedded in a reprogrammable FPGA. It base on negative selection which is suitable to protect a huge amount of devices.

[1]  Thomas Stibor,et al.  Phase Transition and the Computational Complexity of Generating r -Contiguous Detectors , 2007, ICARIS.

[2]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[3]  Charu C. Aggarwal,et al.  On the Surprising Behavior of Distance Metrics in High Dimensional Spaces , 2001, ICDT.

[4]  Eamonn J. Keogh,et al.  Segmenting Time Series: A Survey and Novel Approach , 2002 .

[5]  Stephanie Forrest,et al.  Coverage and Generalization in an Artificial Immune System , 2002, GECCO.

[6]  Wim Vanderbauwhede,et al.  High-Performance Computing Using FPGAs , 2013 .

[7]  Slawomir T. Wierzchon,et al.  Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System , 2000, Intelligent Information Systems.

[8]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[9]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[10]  Maciej Brzozowski,et al.  Embedding the V-Detector Algorithm in FPGA , 2016, CISIM.

[11]  Maciej Brzozowski,et al.  Hardware Approach for Generating b-detectors by Immune-Based Algorithms , 2014, CISIM.

[12]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[13]  Khalid Sayood,et al.  Introduction to Data Compression , 1996 .

[14]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[15]  Slawomir T. Wierzchon,et al.  Hybrid Negative Selection Approach for Anomaly Detection , 2012, CISIM.

[16]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[17]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[18]  Pong P. Chu RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability , 2006 .