2017
DOI: 10.4236/jcc.2017.57016
|View full text |Cite
|
Sign up to set email alerts
|

An Immunity-Based IOT Environment Security Situation Awareness Model

Abstract: To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-self, antigen and detector are given. According to the relationship between the antibody-concentration of memory detectors and the intensity of network attack activities, the security situation evaluation method under IOT environment based on artificial immune system is presented. And then according … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…In [113], the proposed hybrid architecture is implemented using a Central Security System (CSS), but the aggregation of information such as RSSI is done by Radio Probes. In [108], the detection components are 6BR as a security awareness center (SAC) and security sensors (SS). The SS is viewed as immunitybased sensor which extracts, evaluates and predicts security situations.…”
Section: ) On the Basis Of Placement Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…In [113], the proposed hybrid architecture is implemented using a Central Security System (CSS), but the aggregation of information such as RSSI is done by Radio Probes. In [108], the detection components are 6BR as a security awareness center (SAC) and security sensors (SS). The SS is viewed as immunitybased sensor which extracts, evaluates and predicts security situations.…”
Section: ) On the Basis Of Placement Methodologymentioning
confidence: 99%
“…Clonal selection algorithms, a common technique in AIS has been used to evolve the detector for new and mutated attacks in [106]. Further amelioration of AIS involves delegating the training of AIS to the cloud platform [107] and grey prediction method for intrusion prediction and response [108]. [114] propose lightweight GRU with one hidden layer and one hidden unit and performed ten experiments for tuning each hyper parameter to an optimal value.…”
Section: ) On the Basis Of Detection Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…The security and Privacy requirements in IOT are authentication, Access control, Data confidentiality, security and trust, etc. different layers of IOT [6]. Security problems, such as denial of service attacks, sybil attacks, data attacks, code attacks, local security of sensing nodes.…”
Section: Securitymentioning
confidence: 99%