Skip to main content
Log in

Detecting interest cache poisoning in sensor networks using an artificial immune algorithm

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

The objective of this paper is to investigate how a Danger Theory based Artificial Immune System—in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor network. The method is validated using two separate implementations: a simulation using J-sim and an implementation for the T-mote Sky sensor using TinyOS. This paper also introduces a new sensor network attack called an Interest Cache Poisoning Attack and investigates how the DCA can be applied to detect this attack in a series of experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Matzinger P (1994) Tolerance, danger and the extended family. Annu Rev Immunol 12:991–1045

    Google Scholar 

  2. Aickelin U., Bentley P., Cayzer S, Kim J, McLeod J (2003) Danger theory: the link between AIS and IDS. In: Proceedings of the 2nd international conference on AIS (ICARIS-03), pp 147–155

  3. Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for intrusion detection. In: Proceedings of ICARIS-05. Springer, Berlin, pp 153–167

    Google Scholar 

  4. Greensmith J, Twycross J, Aickelin U (2006) Dendritic cells for anomaly detection. In: Proceedings of IEEE congress on evolutionary computation (CEC-06), Vancouver, Canada

  5. Bentley P, Greensmith J, Ujjin S (2005) Two ways to grow tissue for AIS. In: Proceedings of the 3rd international conference on AIS (ICARIS-05). Springer, Berlin, pp 139–152

    Google Scholar 

  6. Kim J, Wilson W, Aickelin U, McLeod J (2005) Cooperative automated worm response and detection ImmuNe algorithm (CARDINAL) inspired by T-cell immunity and tolerance. In: Proceedings of the 3rd international conference on AIS (ICARIS-05), pp 168–181

  7. Twycross J, Aickelin U (2005) Towards a conceptual framework for innate immunity. In: Proceedings of the 3rd international conference on AIS (ICARIS-05). Springer, Berlin, pp 153–167

    Google Scholar 

  8. Twycross J, Aickelin U (2006) LIBTISSUE—implementing innate immunity. In: Proceedings of the CEC-06, Vancouver, Canada

  9. Sarafijanovic S, Le Boudec J (2005) An AIS for misbehaviour detection in mobile ad-hoc networks with virtual thymus, clustering, danger signals and memory detectors. In: Proceedings of the 2nd international conference on AIS (ICARIS-04). Springer, Berlin, pp 342–356

    Google Scholar 

  10. Greensmith J et al (2006) Articulation and clarification of the dendritic cell algorithm. In: Proceedings of ICARIS-2006

  11. Intanagonwiwat C et al. (2003) Directed diffusion for wireless sensor networking. IEEE/ACM Trans Netw 11(1):2–16

    Article  Google Scholar 

  12. Akyildiz IF et al (2002) A survey on sensor networks. IEEE Commun Mag August:102–114

    Google Scholar 

  13. Estrin D, Cullar D, Pister K, Sukhatme G (2002) Connecting the physical world with pervasive networks. In: Pervasive computing, pp 59–69

  14. Karlof C, Wagner D (2004) Secure routing in wireless sensor networks: attacks and countermeasures. In: Ad hoc networks, pp 293–315

  15. Wallenta C (2006) Detecting malicious activities in directed diffusion based sensor networks. Diploma thesis, System Architecture Group, Department of Computer Science, Universität Karlsruhe

  16. Mati S, Giuli T, Lai K, Baker M (2000) Mitigating routing misbehaviour in mobile ad hoc networks

  17. Lioy A, Maino F, Marian M, Mazzocchi D (2000) In: DNS security, TERENA networking conference

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter J. Bentley.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wallenta, C., Kim, J., Bentley, P.J. et al. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. Appl Intell 32, 1–26 (2010). https://doi.org/10.1007/s10489-008-0132-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-008-0132-0

Keywords

Navigation