Browse > Article
http://dx.doi.org/10.3837/tiis.2019.05.027

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks  

Xiao, Xin (School of Computer Science, Southwest Minzu University)
Zhang, Ruirui (School of Business, Sichuan Agricultural University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.5, 2019 , pp. 2732-2753 More about this Journal
Abstract
With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.
Keywords
wireless sensor network; artificial immune; intrusion detection; danger theory; genetic algorithms; security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Z. Lai, M. Wang, and J. Yin, "Survey on wireless sensor network security," Electronic Measurement Technology, vol. 12, pp. 78-84, 2010.
2 V. C. Sekhar, and M. Sarvabhatla, "Security in wireless sensor networks with public key techniques," in Proc. of International Conference on Computer Communication & Informatics, pp. 1-16, 2012.
3 R.W. Anwar, M. Bakhtiari, A. Zainal, et al, "A survey of wireless sensor network security and routing techniques," Research Journal of Applied Sciences Engineering & Technology, vol. 9, no. 11, pp. 1016-1026, 2015.   DOI
4 Q. Shi, L. Qin, L. Song, et al, "A dynamic programming model for internal attack detection in wireless sensor networks," Discrete Dynamics in Nature and Society, vol. 2017, Article ID 5743801, 9 pages, 2017.
5 M. Zeeshan, H. Javed, A. Haider, et al, "An immunology inspired flow control attack detection using negative selection with r-contiguous bit matching for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2015, Article ID 169654, 7 pages, 2015.
6 IEEE 802.15.4, http://standards.ieee.org/findstds/standard/802.15.4e-2012.html
7 ZigBee, http://www.zigbee.org/
8 Y. Li, C. Tang, S. Peeta, et al, "Nonlinear Consensus-Based Connected Vehicle Platoon Control Incorporating Car-Following Interactions and Heterogeneous Time Delays," IEEE Transactions on Intelligent Transportation Systems, 2018.
9 Y. Li, C. Tang, K. Li, et al, "Consensus-Based Cooperative Control for Multi-Platoon Under the Connected Vehicles Environment," IEEE Transactions on Intelligent Transportation Systems, 2018.
10 Y. Li, C. Tang, S. Peeta, et al, "Integral-Sliding-Mode Braking Control for Connected Vehicle Platoon: Theory and Application," IEEE Transactions on Industrial Electronics, 2018.
11 J. Balthrop, F. Esponda, S. Forrest, et al, "Coverage and generalization in an artificial immune system," in Proc. of he the 4th Annual Conference on Genetic and Evolutionary Computation, New York, Morgan Kaufmann Publishers Inc, pp. 3-10, 2002.
12 I. Onat and A. Miri, "An intrusion detection system for wireless sensor networks," in Proc. of IEEE International Conference on Wireless & Mobile Computing, Networking & Communications, vol. 3, no. 4, pp. 587-594, 2005.
13 S. Schaust, and H. Szczerbicka, "Applying antigen-receptor degeneracy behavior for misbehavior response selection in wireless sensor networks," Artificial Immune Systems, ICARIS 2011, Lecture Notes in Computer Science, vol. 6825, Springer, Berlin, Heidelberg.
14 R. Roman, J. Zhou, and J. Lopez, "Applying intrusion detection systems to wireless sensor networks," in Proc. of IEEE Consumer Communications & Networking Conference, vol. 1, pp. 640-644, 2006.
15 D. Martynov, J. Roman, S. Vaidya, and H. Fu, "Design and implementation of an intrusion detection system for wireless sensor networks," in Proc. of IEEE International Conference on Electro/Information Technology, Chicago, vol. 3, no. 5, pp. 507-512, 2007.
16 M. Drozda, S. Schaust, and H. Szczerbicka, "AIS for misbehavior detection in wireless sensor networks: performance and design principles," IEEE Congress on Evolutionary Computation, Singapore, pp. 3719-3726, 2007.
17 J. Kim, P. Bentley, C. Walenta, et al, "Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm," Artificial Immune Systems, ICARIS 2006, Lecture Notes in Computer Science, vol. 4163, Springer, Berlin, Heidelberg.
18 M. Wazid, and A. K. Das, "An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks," Wireless Pers Commun, vol. 90, pp. 1971-2000, 2016.   DOI
19 P. Matzinger, "The danger model: a renewed sense of self," Science, vol. 296, pp. 301-305, 2002.   DOI
20 W. L. Al-Yaseen, Z. A. Othman, and M. Z. A. Nazri, "Real-time multi-agent system for an adaptive intrusion detection system," Pattern Recognition Letters, vol. 85, pp. 56-64, 2017.   DOI
21 S. X. Wu, and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: a review," Applied Soft Computing, vol. 10, no. 1, pp. 1-35, 2010.   DOI
22 U. Aickelin, P. Bentley, S. Cayzer, et al, "Danger theory: the link between AIS and IDS?," Artificial Immune Systems, ICARIS 2003, Lecture Notes in Computer Science, vol 2787. Springer, Berlin, Heidelberg, 2003.
23 M. Gunasekaran and S. Periakaruppan, "GA-DoSLD: genetic algorithm based denial-of-sleep attack detection in WSN," Security and Communication Networks, vol. 2017, Article ID 9863032, 10 pages, 2017.
24 Y. B. Chen, C. Feng, Q. Zhang, et al, "Integrated artificial immune system for intrusion detection," Journal of Communications, vol. 33, no. 2, pp. 125-131, 2012.
25 P. Levis, N. Lee, M. Welsh, and D. Culler, "TOSSIM: accurate and scalable simulation of entire TinyOS applications," in Proc. of SenSys '03 Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, ACM Press, pp.126-137, 2003.
26 V. C. Chandanashree, U. P. Bhat, P. Kanade et al, "Tinyos based WSN design for monitoring of cold storage warehouses using internet of things," in Proc. of 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 2017.
27 T. Ma, F. Wang, J. Cheng, et al, "A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks," Sensors, vol. 16, no. 10, pp. 1701-1724, 2016.   DOI
28 P. Kour and L. C. Panwar, "A review on security challenges and attacks in wireless sensor networks," International Journal of Science and Research, vol. 3, no. 5, pp. 1360-1364, 2014.
29 S. Biswas and S. Adhikari, "A survey of security attacks, defenses and security mechanisms in wireless sensor network," International Journal of Computer Applications, vol. 131, no. 17, pp. 28-35, 2015.   DOI
30 E. Sharifi, M. Khandan, and M. Shamsi, "MAC protocols security in wireless sensor networks: a survey," International Journal of Computer and Information Technology, vol. 3, no. 1, pp. 105-109, 2014.
31 H. Ali, A. A. Mamun, and S. Anwar, "All possible security concern and solutions of WSN: a comprehensive study," International Journal of Computer Science and Technology, vol. 6, no. 4, pp. 64-74, 2015.
32 S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," in Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland: IEEE Computer Society Press, pp. 202-212, 1994.
33 D. Singla and C. Diwaker, "Analysis of security attacks in wireless sensor networks," International Journal of Software and Web Sciences, vol. 14, pp. 26-30, 2014.