全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

An Immunity-Based IOT Environment Security Situation Awareness Model

DOI: 10.4236/jcc.2017.57016, PP. 182-197

Keywords: IOT Environment, Security Situation Awareness, Artificial Immune System, Grey Prediction

Full-Text   Cite this paper   Add to My Lib

Abstract:

To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-self, antigen and detector are given. According to the relationship between the antibody-concentration of memory detectors and the intensity of network attack activities, the security situation evaluation method under IOT environment based on artificial immune system is presented. And then according to the situation time series obtained by the mentioned evaluation method, the security situation prediction method based on grey prediction theory is presented for forecasting the intensity and security situation of network attack activities that the IOT environment will be suffered in next step. The experimental results show that IIESSA provides a novel and effective model for perceiving security situation of IOT environment.

References

[1]  Wallgren, L., Raza, S. and Voigt, T. (2013) Routing Attacks and Countermeasures in the RPL-Based Internet of Things. International Journal of Distributed Sensor Networks, 1-11.
https://doi.org/10.1155/2013/794326
[2]  Li, S.C., Xu, L.D. and Zhao, S.S. (2015) The Internet of Things: A Survey. Information Systems Frontiers, 17, 243-259.
[3]  IERC (2013) Coordinating and Building a Broadly Based Consensus on the Ways to Realize the Internet of Things in Europe. www.internet-of-things-research.eu/pdf/Poster_IERC_A0_V01.pdf
[4]  Kirtsis, D. (2011) Closed-Loop PLM for Intelligent Products in the Era of the Internet of Things. Computer-Aided Design, 43, 479-501.
[5]  Bi, Z.M., Xu, L.D. and Wang, C.G. (2014) Internet of Things for Enterprise Systems of Modern Manufacturing. IEEE Transactions on Industrial Informatics, 10, 1537-1546.
[6]  Sun, X.Y. and Wang, C.G. (2011) The Research of Security Technology in the Internet of Things. In: Jin, D. and Lin, S., Eds., Advances in Computer Science, Intelligent System and Environment, Vol. 105, Springer, Berlin, Heidelberg, 113-119.
https://doi.org/10.1007/978-3-642-23756-0_19
[7]  Whitmore, A., Agarwal, A. and Xu, L.D. (2015) The Internet of Things—A Survey of Topics and Trends. Information Systems Frontiers, 17, 261-274.
[8]  Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A. (2015) Security, Privacy and Trust in Internet of Things: The Road Ahead. Computer Networks, 76, 146-164.
[9]  Javanmardi, S., Shojafar, M., Shariatmadari, S. and Ahrabi, S.S. (2014) FR Trust: A Fuzzy Reputation-Based Model for Trust Management in Semantic P2P Grids. International Journal of Grid and Utility Computing, 6, 57-66.
https://doi.org/10.1504/IJGUC.2015.066397
[10]  Li, H. and Zhou, X. (2011) Study on Security Architecture for Internet of Things. In: Zeng, D., Eds., Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, Vol. 224, Springer, Berlin, Heidelberg, 404-411.
https://doi.org/10.1007/978-3-642-23214-5_53
[11]  Abie, H. (2009) Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware. Proceedings of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, 12-15 October 2009, 810-817.
[12]  Habib, K. and Leister, W. (2013) Adaptive Security for the Internet of Things Reference Model. Proceedings of Norwegian Information Security Conference, NISK, Stavanger, 13-24.
[13]  Yan, Z., Zhang, P. and Vasilakos, A.V. (2014) A Survey on Trust Management for Internet of Things. Journal of Network and Computer Applications, 42, 120-134.
[14]  Raza, S., Wallgren, L. and Voigt, T. (2013) SVELTE: Real-Time Intrusion Detection in the Internet of Things. Ad Hoc Networks, 11, 2661-2674.
[15]  Hossain, M.S. and Raghunathan, V. (2010) AEGIS: A Lightweight Firewall for Wireless Sensor Networks. In: Rajaraman, R., Moscibroda, T., Dunkels, A. and Scaglione, A., Eds., Distributed Computing in Sensor Systems. DCOSS 2010. Lecture Notes in Computer Science, Vol. 6131, Springer, Berlin, Heidelberg, 258-272.
https://doi.org/10.1007/978-3-642-13651-1_19
[16]  Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L. and Lo, O. (2012) Formal Security Policy Implementations in Network Firewalls. Computers & Security, 31, 253-270.
[17]  Hu, H.X., Ahn, G.J. and Kulkarni, K. (2012) Detecting and Resolving Firewall Policy Anomalies. IEEE Transactions on Dependable and Secure Computing, 9, 318-331.
https://doi.org/10.1109/TDSC.2012.20
[18]  Wilhelm, M., Martinovic, I., Schmitt, J.B. and Lenders, V. (2013) Air Dominance in Sensor Networks: Guarding Sensor Motes Using Selective Interference. 1-16. arXiv preprint arXiv:1305. 4038
[19]  Xiao, Q., Qin, Y. C., Xu, C. and Li, K.L. (2013) Lightweight Detecting and Resolving Algorithm for Firewall Policy Conflict. Proceedings of the 5th International Conference on Ubiquitous and Future Networks, Da Nang, 2-5 July 2013, 234-239.
[20]  Kubler, S., Framling, K. and Buda, A. (2014) A Standardized Approach to Deal with Firewall and Mobility Policies in the IoT. Pervasive and Mobile Computing, 20, 100-114.
[21]  Wang, L.H., Teng, H.K. and Yu, G.H. (2014) Sensors Access Scheme Design Based on Internet of Things Gateways. Proceedings of the 5th International Conference on Intelligent Systems Design and Engineering Application, Hunan, 15-16 June 2014, 901-904.
[22]  Zhu, Q., Wang, R.C., Chen, Q., Liu, Y. and Qin, W.J. (2010) IoT Gateway: Bridging Wireless Sensor Networks into Internet of Things. Proceedings of IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, Hong Kong, 11-13 December 2010, 347-352.
[23]  Schrickte, L.F., Montez, C., De Oliveira, R. and Pinto, A.R. (2013) Integration of Wireless Sensor Networks to the Internet of Things Using a 6LoWPAN Gateway. Proceedings of the 3rd Brazilian Symposium on Computing Systems Engineering, Niteroi, 4-8 December 2013, 119-124.
https://doi.org/10.1109/sbesc.2013.37
[24]  Forrest, S., Perelson, A.S., Allen, L. and Cherukuri, R. (1004) Self-Nonself Discrimination in a Computer. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, 16-18 May 1994, 202-202.
[25]  Timmis, J., Hone, A., Stibor, T. and Clark, E. (2008) Theoretical Advances in Artificial Immune Systems. Theoretical Computer Science, 403, 11-32.
[26]  Shi, Y.Q., Li, R.F., Peng, X.N. and Yue, G.X. (2016) Network Security Situation Prediction Approach Based on Clonal Selection and SCGM(1, 1)c Model. Journal of Internet Technology, 17, 421-429.
[27]  Shi, Y.Q., Li, R.F., Zhang, Y. and Peng, X.N. (2015) An Immunity-Based Time Series Prediction Approach and Its Application for Network Security Situation. Intelligent Service Robotics, 8, 1-22.
https://doi.org/10.1007/s11370-014-0160-z
[28]  Shi, Y.Q., Li, T., Chen, W. and Zhang, R.R. (2009) A Quantitative Model for Network Security Situation Awareness Based on Immunity And Grey Theory. Proceedings of the 2009 ISECS International Colloquium on Computing, Communication, Control, and Management, Sanya, 8-9 August 2009, 14-18.
https://doi.org/10.1109/CCCM.2009.5267847
[29]  Shamshirband, S., Anuar, N.B., Laiha, M., Kiah, M., Rohani, V.A., Petkovic, D., Misra, S. and Khan, A.N. (2014) Co-FAIS: Cooperative Fuzzy Artificial Immune System for Detecting Intrusion in Wireless Sensor Networks. Journal of Network and Computer Applications, 42, 102-117.
[30]  Mostafaei, H. and Shojafar, M. (2015) A New Meta-Heuristic Algorithm for Maximizing Lifetime of Wireless Sensor Networks. Wireless Personal Communications, 82, 723-742.
https://doi.org/10.1007/s11277-014-2249-2
[31]  Naranjo, P.G.V., Shojafar, M., Mostafaei, H., Pooranian, Z. and Baccarelli, E. (2017) P-SEP: A Prolong Stable Election Routing Algorithm for Energy-Limited Heterogeneous Fog-Supported Wireless Sensor Networks. The Journal of Supercomputing, 73, 733-755.
[32]  Saybani, M.R., Shamshirband, S., Hormozi, S.G., Wah, T.Y., Aghabozorgi, S., Pourhoseingholi, M.A. and Olariu, T. (2015) Diagnosing Tuberculosis with a Novel Support Vector Machine-Based Artificial Immune Recognition System. Iranian Red Crescent Medical Journal, 17, e24557.
https://doi.org/10.5812/ircmj.17(4)2015.24557
[33]  Li, T. (2005) An Immunity Based Network Security Risk Estimation. Science in China Series F. Information Sciences, 48, 557-578.
[34]  Deng, J.L. (2002) Grey System Theory. Publishing House of Huazhong University of Science and Technology, Wuhan.
[35]  Wei, B.G., Zhang, W.Z. and Guo, Z.S. (2000) Method of BX Data Producing for Grey Forecast and Its Application for Environmental Forecast. Journal of Qiqihar University, 16, 59-61.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133