2007 IEEE Congress on Evolutionary Computation 2007
DOI: 10.1109/cec.2007.4424955
|View full text |Cite
|
Sign up to set email alerts
|

AIS for misbehavior detection in wireless sensor networks: Performance and design principles

Abstract: A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices (nodes) are expected to operate autonomously, be battery powered and have very limited computational capabilities. This makes the task of protecting a sensor network against misbehavior or possible malfunction a challenging problem. In this document we discuss performance of Artificial immune systems (AIS) when used as the mechanism for detecting misbehavior.We show that (i) mechani… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(37 citation statements)
references
References 27 publications
0
37
0
Order By: Relevance
“…However, the proposed scheme is a variants of pairwise key pre-distribution protocols, which provide perfect network resilience against a compromised node attack -for more details the reader may refer to [13], [28], [29]. Moreover, in the proposed scheme, the C node can periodically monitor the misbehavior of SNs using [30] within its cell and informs the BS upon a detection because the proposed scheme is divided into a number of cells. Thus, compromising a node and node fabrication attack in the cell does not affect the security of non-compromised cells.…”
Section: Security Analysis a Security Analysismentioning
confidence: 99%
“…However, the proposed scheme is a variants of pairwise key pre-distribution protocols, which provide perfect network resilience against a compromised node attack -for more details the reader may refer to [13], [28], [29]. Moreover, in the proposed scheme, the C node can periodically monitor the misbehavior of SNs using [30] within its cell and informs the BS upon a detection because the proposed scheme is divided into a number of cells. Thus, compromising a node and node fabrication attack in the cell does not affect the security of non-compromised cells.…”
Section: Security Analysis a Security Analysismentioning
confidence: 99%
“…The DCA takes advantage of positive and negative feedback loops from the signals produced in the tissue regarding the safe or dangerous context of the tissue and the detection of pathogen related signatures [20,21]. This algorithm has been shown to be very light weighted [11,12]. However the false positive rates when evaluated for new Sybil attacks which are one of the data flow attack have shown high rates.…”
Section: Methodsmentioning
confidence: 99%
“…The prevention of Sybil attack in WSN using Dendritic Cell Algorithm (DCA) utilizes the signal produced in the tissue in order to detect pathogen related signatures [11,12]. This technique proved to be light weighted for WSN but its performance for data flow anomaly attack detection, especially for Sybil attack, has shown degradation.…”
Section: Introductionmentioning
confidence: 99%
“…Drozda et al applied a negative selection algorithm to misbehavior detection in sensor networks [61]. The authors made a number of changes to reduce the computational overhead of the algorithm.…”
Section: Misbehavior Detection In Wireless Networkmentioning
confidence: 99%