2013 Ninth International Conference on Computational Intelligence and Security 2013
DOI: 10.1109/cis.2013.168
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach to IoT Security Based on Immunology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…Implementation of IEEE 802.15.4-compliant link layer security procedures is advised in [6] and a lightweight encryption/decryption method for ID authentication among nodes in sensor layer has been presented in [7]. Concepts from Artificial Immune System (AIS) have been imported to detect attacks on IoT and have used those concepts to develop an IoT intrusion detection system with dynamic defense [8], [9]. VIRTUS [10], a middleware solution for management of applications in IoT environments adopts open standards such as XMPP and OSGi.…”
Section: Introductionmentioning
confidence: 99%
“…Implementation of IEEE 802.15.4-compliant link layer security procedures is advised in [6] and a lightweight encryption/decryption method for ID authentication among nodes in sensor layer has been presented in [7]. Concepts from Artificial Immune System (AIS) have been imported to detect attacks on IoT and have used those concepts to develop an IoT intrusion detection system with dynamic defense [8], [9]. VIRTUS [10], a middleware solution for management of applications in IoT environments adopts open standards such as XMPP and OSGi.…”
Section: Introductionmentioning
confidence: 99%
“…As result, there is a large number of malware entry points, which increases vulnerability. By applying a biological immunology approach, a scheme has been proposed based on a dynamic defense security mechanism to alleviate these security issues in an IoT architecture [28]. In [26], attempts were done to secure IoT communications by ensuring the security of IoT devices.…”
Section: Challenges Of Iotmentioning
confidence: 99%
“…Our ongoing efforts revolve around 4 research pillars: formalizing norms and commitments, studying the synergy between business and social norms/commitments, monitoring commitments so that violations are detected promptly and penalties to these violations are taken, and developing a proof‐of‐concept with respect to a certain case study. In conjunction with these ongoing efforts, we would like to examine thing mutation so that things remain competitive/attractive, responsive, and in business. Mutation would lead to things that would bind and/or unbind capabilities on the fly (and as they see fit).…”
Section: Ongoing Effortsmentioning
confidence: 99%