Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Bio-Inspired Mobility in Environment Aware Wireless Sensor Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Information Sciences: an International Journal - Special issue: Evolutionary computation
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Avoiding ballot stuffing in eBay-like reputation systems
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Developing a Model for Trust Management in Pervasive Devices
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Ant-based Reputation Evidence Distribution in P2P Networks
GCC '06 Proceedings of the Fifth International Conference on Grid and Cooperative Computing
Wireless sensor networks: Enabling technology for ambient intelligence
Microelectronics Journal
Proceedings of the 5th international conference on Embedded networked sensor systems
The 5th ACM Conference on Embedded Network Sensor Systems
Castalia: revealing pitfalls in designing distributed algorithms in WSN
Proceedings of the 5th international conference on Embedded networked sensor systems
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Local anomaly detection for mobile network monitoring
Information Sciences: an International Journal
An overview of the OMNeT++ simulation environment
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Immune-based algorithms for dynamic optimization
Information Sciences: an International Journal
Attacks and defenses of ubiquitous sensor networks
Attacks and defenses of ubiquitous sensor networks
Performance evaluation of density-based clustering methods
Information Sciences: an International Journal
The SocialTrust framework for trusted social information management: Architecture and algorithms
Information Sciences: an International Journal
Entropy-based trust management for data collection in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Intrusion detection in sensor networks using clustering and immune systems
IDEAL'09 Proceedings of the 10th international conference on Intelligent data engineering and automated learning
Integrated Computer-Aided Engineering
The security of machine learning
Machine Learning
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Secure routing in sensor networks: security problem analysis and countermeasures
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Bayesian network based trust management
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
MTrust: a reputation-based trust model for a mobile agent system
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
IEEE Communications Magazine
Information Sciences: an International Journal
Hi-index | 0.07 |
Providing security to the emerging field of ambient intelligence will be difficult if we rely only on existing techniques, given their dynamic and heterogeneous nature. Moreover, security demands of these systems are expected to grow, as many applications will require accurate context modeling. In this work we propose an enhancement to the reputation systems traditionally deployed for securing these systems. Different anomaly detectors are combined using the immunological paradigm to optimize reputation system performance in response to evolving security requirements. As an example, the experiments show how a combination of detectors based on unsupervised techniques (self-organizing maps and genetic algorithms) can help to significantly reduce the global response time of the reputation system. The proposed solution offers many benefits: scalability, fast response to adversarial activities, ability to detect unknown attacks, high adaptability, and high ability in detecting and confining attacks. For these reasons, we believe that our solution is capable of coping with the dynamism of ambient intelligence systems and the growing requirements of security demands.