A Research into an Intrusion Detection System Based on Immune Principle and Multi-Agent in WSN

Article Preview

Abstract:

Along with deep-going researches and practical applications of Wireless Sensor Network, security issues contained therein are raising a growing concern. Based on a systematic analysis of the current intrusion detection system and with integration between the mechanism of artificial immune system and multi-agent technology, the paper provides with a new model of an intrusion detection system based on artificial immune system and multi-agent technology, and further introduces the functions of agents in the model as well as the process of antibody selection.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

5157-5161

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yulong Shen , Qingqi Pei. A General Description of Security Technology of Wireless Sensor Networks. Beijing: Posts and telecom press(2010).

Google Scholar

[2] Chung Su, Ming Chang Ko, Hwang Kuo Yan. The New Intrusion Prevention and Detection Approaches for Clustering-Based Sensor Network[C]/Proc of WCNC'05, 1927-1932(2005).

DOI: 10.1109/wcnc.2005.1424814

Google Scholar

[3] Zhang Yongguang, Lee Wenke, Huang Yi-an. Intrusion Detection Techniques for Mobile Wireless Network[J]. Wireless Networks, 2003, 9(5): 545-556.

Google Scholar

[4] Kaehirski O, Guha R. Intrsion Detection Using Mobile Agents in Wireless Ad Hoc Networks[C]/Proc of IEEE Workshop on Knowledge Media Networking, 153-158(2002).

DOI: 10.1109/kmn.2002.1115178

Google Scholar

[5] Zixing Cai, Guangyou Xu. Artificial Intelligence: Principles and Applications. Beijing: Tsinghua University press(2004).

Google Scholar

[6] Russel S, Norvig P. Artificial Intelligence: A Modern Approach[M]. Upper Saddle River: Prentice Hall, (1995).

Google Scholar

[7] Xuanhui Yan. Immune Vaccination Strategy Application of Detect Intrusions Model. Electronic Journal. Vol. 37( 2009), pp.780-785.

Google Scholar

[8] Kun Zhang, Manwu Xu. An Intrusion Detection Method Based on Relative Hamming Distance. Chinese Journal of Computers. Vol. 26(2003).

Google Scholar