Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm

  • Authors:
  • Jungwon Kim;Peter Bentley;Christian Wallenta;Mohamed Ahmed;Stephen Hailes

  • Affiliations:
  • Department of Computer Science, University College London, London, U.K.;Department of Computer Science, University College London, London, U.K.;Department of Computer Science, University College London, London, U.K.;Department of Computer Science, University College London, London, U.K.;Department of Computer Science, University College London, London, U.K.

  • Venue:
  • ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

There is a list of unique immune features that are currently absent from the existing artificial immune systems and other intelligent paradigms. We argue that some of AIS features can be inherent in an application itself, and thus this type of application would be a more appropriate substrate in which to develop and integrate the benefits brought by AIS. We claim here that sensor networks are such an application area, in which the ideas from AIS can be readily applied. The objective of this paper is to illustrate how closely a Danger Theory based AIS – in particular the Dendritic Cell Algorithm matches the structure and functional requirements of sensor networks. This paper also introduces a new sensor network attack called an Interest Cache Poisoning Attack and discusses how the DCA can be applied to detect this attack.