Connecting the Physical World with Pervasive Networks
IEEE Pervasive Computing
Directed diffusion for wireless sensor networking
IEEE/ACM Transactions on Networking (TON)
Articulation and clarification of the dendritic cell algorithm
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Towards a conceptual framework for innate immunity
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Two ways to grow tissue for artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
IEEE Communications Magazine
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Intrusion detection in sensor networks using clustering and immune systems
IDEAL'09 Proceedings of the 10th international conference on Intelligent data engineering and automated learning
Integrated Computer-Aided Engineering
Detecting unknown attacks in wireless sensor networks using clustering techniques
HAIS'11 Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I
Mining bridging rules between conceptual clusters
Applied Intelligence
Self-Organizing maps versus growing neural gas in detecting data outliers for security applications
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Adaptive cooperative particle swarm optimizer
Applied Intelligence
Hi-index | 0.00 |
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor network. The method is validated using two separate implementations: a simulation using J-sim and an implementation for the T-mote Sky sensor using TinyOS. This paper also introduces a new sensor network attack called an Interest Cache Poisoning Attack and investigates how the DCA can be applied to detect this attack in a series of experiments.