A Security Situation Sense Model Based on Artificial Immune System in the Internet of Things

Article Preview

Abstract:

Grasping security situation of the Internet of Things (IoT) is useful to work out a scientific and reasonable strategy to defend the IoT security. In the interest of resolving the problems of the security situation sense technology for IoT, a security situation sense model based on artificial immune system for IoT is proposed in this paper. Security threat sense sub-model, formulation mechanism for security threat intensity and security situation assessment sub-model are established. The security threats in the IoT environment are surveyed effectively. Quantitative and accurate assessment for the Real-Time security situation is realized. Theoretical analysis shows that the proposed model is significative of theory and practice.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

2457-2460

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] X.Z. Chen, Q.H. Zheng, X.H. Guan Xiao, C.G. Lin: Quantitative Hierarchical Threat Evaluation Model for Network Security, Journal of Software, Vol. 17, pp.885-897 (2006).

Google Scholar

[2] Y. Wei, Y.F. Lian, D.G. Feng: A Network Security Situational Awareness Model Based on Information Fusion, Journal of Computer Research and Development, Vol. 46, pp.353-362 (2009).

Google Scholar

[3] ITU. ITU Internet Reports 2005: The Internet of Things, Geneva: ITU (2005).

Google Scholar

[4] D.G. Feng, Y. Zhang, Y.Q. Zhang: Survey of information security risk assessment, Journal of China Institute of Communications, Vol. 25, pp.10-18 (2004).

Google Scholar

[5] A. Juels: RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, Vol. 24, pp.381-394 (2006).

DOI: 10.1109/jsac.2005.861395

Google Scholar

[6] Y.B. Liu, W. P. Hu: Security model and key technology on Internet of Things, Digital Communication, pp.28-33 (2010).

Google Scholar

[7] V. Oleshchuk: Internet of things and privacy preserving technologies, Proc of 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Aalborg, Denmark, pp.336-340 (2009).

DOI: 10.1109/wirelessvitae.2009.5172470

Google Scholar

[8] L. Mirowski, J. Hartnett: Deckard: A system to detect change of RFID tag ownership, International Journal of Computer Science and Network Security, Vol. 7, pp.89-98 (2007).

Google Scholar

[9] T. Li: Computer immunology, Publishing House of Electronics Industry, Beijing (2004).

Google Scholar

[10] J. Kim: P.J. Bentley, Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection, Proc of the Congress on Evolutionary Computation, pp.1015-1020 (2002).

DOI: 10.1109/cec.2002.1004382

Google Scholar

[11] T. Li: An immunity based network security risk estimation, Science in China Ser. F Information Sciences, Vol. 48, pp.798-816 (2005).

Google Scholar