Research on Intrusion Detection for the Internet of Things Based on Clone Selection Principle

Article Preview

Abstract:

The fast development of the Internet of Things (IoT) makes its security problems appear gradually. It is urgent to study the intrusion detection technology for IoT security threats. An intrusion detection method based on the clone selection principle is proposed in this paper. The key elements in the clone selection theory are simulated. The clone selection algorithm is realized to be applied in IoT. Detection elements for security threats evolve to adapt the real IoT environment. The proposed method is expected to improve the detection efficiency of IoT security threats.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 562-564)

Pages:

1982-1985

Citation:

Online since:

August 2012

Export:

Price:

[1] International Telecommunication Union: ITU Internet Reports 2005: The Internet of Things, Geneva: ITU (2005).

Google Scholar

[2] Y.Z. Yang, J.H. Gao: A Study on the Internet of Things, and Its Scientific Development in China, China Business and Market, (2), pp.46-49 (2010).

Google Scholar

[3] A. Mitrokotsa, M.R. Rieback, A.S. Tanenbaum: Classifying RFID attacks and defenses, Inf. Syst. Front, pp.491-505 (2010).

DOI: 10.1007/s10796-009-9210-z

Google Scholar

[4] C.M. Medaglia, A. Serbanati: An Overview of Privacy and Security Issues in the Internet of Things, Proc. of the Internet of Things: 20th Tyrehenian Workshop on Digital Communications, pp.389-395 (2010).

DOI: 10.1007/978-1-4419-1674-7_38

Google Scholar

[5] R.H. Weber: Internet of Things – New security and privacy challenges, Computer Law & Security Review, vol. 26, pp.23-30 (2010).

DOI: 10.1016/j.clsr.2009.11.008

Google Scholar

[6] Y.B. Liu, W.P. Hu: Security model and key technology on Internet of Things, Digital Communication, pp.28-33 (2010).

Google Scholar

[7] G. Yang, J. Xu, W. Chen, Z. H. Qi and H. Y. Wang: Security Characteristic and Technology in the Internet of Things, Journal of Nanjing University of Posts and Telecommunications (Natural Science), vol. 30, pp.20-29 (2010).

Google Scholar

[8] T. Li: Computer immunology, Beijing: Publishing House of Electronics Industry (2004).

Google Scholar

[9] J. Hunt, J. Timmis, D. Cooke, M. Neal, C. King: Jisys: The development of an Artificial Immune System for real world applications, Springer-Verlag (1999).

DOI: 10.1007/978-3-642-59901-9_9

Google Scholar

[10] L.N. de Castro, et al.: Learning and Optimization Using the Clonal Selection Principle, IEEE Transaction On Evolution Computation, vol. 6 (2002).

Google Scholar

[11] J. Kim, P.J. Bentley: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection, Proc. of the Congress on Evolutionary Computation, pp.1015-1020 (2002).

DOI: 10.1109/cec.2002.1004382

Google Scholar