650 research outputs found

    An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors

    Get PDF
    In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. For this purpose, we use an Artificial Immune System (AIS), a system inspired by the human immune system (HIS). Our goal is to build a system that, like its natural counterpart, automatically learns and detects new misbehavior. In this paper we build on our previous work and investigate the use of four concepts: (1

    Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars

    Get PDF
    The application of decentralized reputation systems is a promising approach to ensure cooperation and fairness, as well as to address random failures and malicious attacks in Mobile Ad-Hoc Networks. However, they are potentially vulnerable to liars. With our work, we provide a first step to analyzing robustness of a reputation system based on a deviation test. Using a mean-field approach to our stochastic process model, we show that liars have no impact unless their number exceeds a certain threshold (phase transition). We give precise formulae for the critical values and thus provide guidelines for an optimal choice of parameters.Comment: 17 pages, 6 figure

    AIS for Misbehavior Detection in Wireless Sensor Networks: Performance and Design Principles

    Full text link
    A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices (nodes) are expected to operate autonomously, be battery powered and have very limited computational capabilities. This makes the task of protecting a sensor network against misbehavior or possible malfunction a challenging problem. In this document we discuss performance of Artificial immune systems (AIS) when used as the mechanism for detecting misbehavior. We show that (i) mechanism of the AIS have to be carefully applied in order to avoid security weaknesses, (ii) the choice of genes and their interaction have a profound influence on the performance of the AIS, (iii) randomly created detectors do not comply with limitations imposed by communications protocols and (iv) the data traffic pattern seems not to impact significantly the overall performance. We identified a specific MAC layer based gene that showed to be especially useful for detection; genes measure a network's performance from a node's viewpoint. Furthermore, we identified an interesting complementarity property of genes; this property exploits the local nature of sensor networks and moves the burden of excessive communication from normally behaving nodes to misbehaving nodes. These results have a direct impact on the design of AIS for sensor networks and on engineering of sensor networks.Comment: 16 pages, 20 figures, a full version of our IEEE CEC 2007 pape

    A bio-inspired object tracking algorithm for minimising power consumption

    Get PDF
    This electronic document is a 'live' template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. A wireless sensor network (WSN) is a distributed information processing system with the capabilities of sensing, wireless communication and data processing. Individual sensor modules of such a network sense the environment, perform data processing locally and cooperate with other sensors via communication. One very important issue in the deployment of a wireless sensor network is the problem of optimizing energy consumption as these networks may be deployed in places where energy supply are not readily available such as in a seaport container terminal and they are required to work with a long lifespan. The main objective of our research is to develop an algorithm for controlling the power consumption of sensor modules in a wireless sensor network for mobile object tracking. The algorithm determines the actions of an individual sensor module to enter a low power state to conserve energy while maintaining its functionality to track objects and to optimize the lifespan of the entire sensor network by reducing overall power consumption. A control framework and corresponding algorithms for controlling the actions of a sensor is designed and experimentation is done to show its efficiency in controlling power consumption of a sensor network. © 2010 IEEE.published_or_final_versionThe 2010 International Conference on Green Circuits and Systems (ICGCS 2010), Shanghai, China, 21-23 June 2010. In Proceedings of ICGCS, 2010, p. 355-36

    Exploiting the plasticity of primary and secondary response mechanisms in artificial immune systems

    Get PDF
    One of the key properties of the human immune system is to detect the presence of pathogens, and as such there are numberous immune algorithm which perform anomaly detection and pattern recognition. An additional facet of the human immune system is that an appropriate effector response is generated upon the detection of a pathogen - a process termed the primary response. Additionally the human immune system has the ability to remember the appropriate response to a particular pathogen - the secondary response. The complex orchestration of both the primary and secondary responses are highly dynamic - described in immunological terms as plastic. In this paper we present an overview of the the exact mechanisms of the generation of a T-helper cell primary response and the mechanisms by which it instructs secondary responses and discuss how this can be computationally useful in artificial immune system development

    ReFIoV: a novel reputation framework for information-centric vehicular applications

    Get PDF
    In this article, a novel reputation framework for information-centric vehicular applications leveraging on machine learning and the artificial immune system (AIS), also known as ReFIoV, is proposed. Specifically, Bayesian learning and classification allow each node to learn as newly observed data of the behavior of other nodes become available and hence classify these nodes, meanwhile, the K-Means clustering algorithm allows to integrate recommendations from other nodes even if they behave in an unpredictable manner. AIS is used to enhance misbehavior detection. The proposed ReFIoV can be implemented in a distributed manner as each node decides with whom to interact. It provides incentives for nodes to cache and forward others’ mobile data as well as achieves robustness against false accusations and praise. The performance evaluation shows that ReFIoV outperforms state-of-the-art reputation systems for the metrics considered. That is, it presents a very low number of misbehaving nodes incorrectly classified in comparison to another reputation scheme. The proposed AIS mechanism presents a low overhead. The incorporation of recommendations enabled the framework to reduce even further detection time
    • …
    corecore