Publication Cover
Cybernetics and Systems
An International Journal
Volume 39, 2008 - Issue 7
45
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS

, , , &
Pages 719-742 | Published online: 26 Aug 2008

REFERENCES

  • AIS-Lib. An AIS library for ad hoc and sensor networks. http://www.sim.uni-hannover.de/ais-lib/ .
  • Aickelin , U. , Bentley , P. , Cayzer , S. , Kim , J. , and McLeod , J. 2003 . Danger theory: The link between AIS and IDS . Proc. of the Second Internation Conference on Artificial Immune Systems (ICARIS-03) : 147 – 155 .
  • Banchereau , J. , Briere , F. , Caux , C. , Davoust , J. , Lebecque , S. , Liu , Y. J. , Pulendran , B. , and Palucka , K. 2000 . Immunobiology of dendritic cells . Annual Review of Immunology , 18 ( 1 ): 767 – 811 .
  • Barr , R. , Haas , Z. J. , and van Renesse , R. JiST: Embedding simulation time into a virtual machine . 2004 . Proc. of EuroSim Congress on Modelling and Simulation .
  • Barr , R. , Haas , Z. J. , and Renesse , R. V. 2005 . Scalable wireless ad hoc network simulation . Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad hoc Wireless, and Peer-to-Peer Networks , CRC Press , 297 – 311 . Auerbach Publications: Taylor and Francis Group, Boca Raton, 2005 .
  • Bass , T. 2000 . Intrusion detection systems and multisensor data fusion . Communications of the ACM , 43 ( 4 ): 99 – 105 .
  • Bhargavan , K. , Gunter , C. A. , Kim , M. , Lee , I. , Obradovic , D. , Sokolsky , O. , and Viswanathan , M. 2002 . Verisim: Formal analysis of network simulations . IEEE Transactions on Software Engineering , 28 ( 2 ): 129 – 145 .
  • Bhuse , V. S. 2007 . Lightweight intrusion detection: A second line of defense for unguarded wireless sensor networks . Ph.D. diss. , Western Michigan University .
  • Byte Code Engineering Library (BCEL). jakarta.apache.org/bcel/.
  • Buchegger , S. and Le Boudec , J. Y. 2002 . Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks . Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC) : 226 – 236 .
  • de Castro , L. N. 2006 . Fundamentals of natural computing . Boca Raton : Chapman and Hall/CRC .
  • Chen , J. , Kher , S. , and Somani , A. 2006 . Distributed fault detection of wireless sensor networks . Proceedings of the 2006 workshop on dependability issues in wireless ad hoc networks and sensor networks : 65 – 72 .
  • D'haeseleer , P. , Forrest , S. , and Helman , P. 1996 . An immunological approach to change detection: Algorithms, analysis and implications . IEEE Symposium on Security and Privacy : 95 .
  • Lazarus project. http://www.lazarus.freepascal.org .
  • Drozda , M. , Schaust , S. , and Szczerbicka , H. 2007a . AIS for misbehavior detection in wireless sensor networks: Performance and design principles . IEEE Congress on Evolutionary Computation (CEC'2007) : 3719 – 3726 .
  • Drozda , M. , Schaust , S. , and Szczerbicka , H. 2007b . Is AIS based misbehavior detection suitable for wireless sensor networks? Proc. IEEE Wireless Communications and Networking Conference (WCNC'07) .
  • Drozda , M. and Szczerbicka , H. 2006 . Artificial immune systems: Survey and applications in ad hoc wireless networks . Proc. 2006 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'06) : 485 – 492 .
  • Harmer , P. K. , Williams , P. D. , Gunsch , G. H. , and Lamont , G. B. 2002 . An artificial immune system architecture for computer security applications . Evolutionary Computation, IEEE Transactions on , 6 ( 3 ): 252 – 280 . ZigBee Alliance. http://www.zigbee.org .
  • Hofmeyr , S. A. and Forrest , S. 1999 . Immunity by design: An artificial immune system . Proceedings of the Genetic and Evolutionary Computation Conference , 2 : 1289 – 1296 .
  • Hu , Y. C. , Perrig , A. , and Johnson , D. B. 2006 . Wormhole attacks in wireless networks . IEEE Journal on Selected Areas in Communications , 24 ( 2 ): 370 – 380 .
  • Janeway , Jr. , C. A. 2001 . How the immune system works to protect the host from infection: A personal view . Proceedings of the National Academy of Sciences , 98 ( 13 ): 7461 – 7468 .
  • Karlof , C. and Wagner , D. 2003 . Secure routing in wireless sensor networks: Attacks and countermeasures . Ad Hoc Networks 1 ( 2–3 ): 293 – 315 .
  • Krotiris , I. , Tassos , D. , and Freiling , F. C. 2007 . Towards intrusion detection in wireless sensor networks . Proc. 13th European Wireless Conference .
  • Law , Y. W. and Havinga , P. J. M. 2005. How to secure a wireless sensor network. Proc. the 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference, 89–95.
  • Marti , S. , Giuli , T. J. , Lai , K. , and Baker , M. 2000 . Mitigating routing misbehavior in mobile ad hoc networks . Proceedings of the 6th Annual International Conference on Mobile Computing and Networking , 255 – 265 .
  • Mazhar , N. and Farooq , M. 2007 . BeeAIS: Artificial immune system security for nature inspired, MANET routing protocol, BeeAdHoc . Proc. International Conference on Artificial Immune Systems (ICARIS) , 370 – 381 .
  • Perkins , C. E. and Royer , E. M. 1999 . Ad hoc on-demand distance vector routing . Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications , 90 – 100 .
  • Perrig , A. , Szewczyk , R. , Tygar , J. D. , Wen , V. , and Culler , D. E. 2002 . SPINS: Security protocols for sensor networks . Wireless Networks , 8 ( 5 ): 521 – 534 .
  • Sarafijanovic , S. and Le Boudec , J. Y. 2004 . An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors . Proc. International Conference on Artificial Immune Systems (ICARIS) , 342 – 356 .
  • Schaust , S. and Szczerbicka , H. Artificial immune systems in context of misbehaviour detection . International Journal of Cybernetics and Systems: Special Issue on Smart Future of Knowledge Management . 39 ( 2 ): 136 – 154 , February 2008 .
  • Sterbenz , J. P. G. , Krishnan , R. , Hain , R. R. , Jackson , A. W. , Levin , D. , Ramanathan , R. , and Zao , J. 2002 . Survivable mobile wireless networks: Issues, challenges, and research directions . Proceedings of the ACM Workshop on Wireless Security , 31 – 40 .
  • Twycross , J. and Aickelin , U. 2006 . Libtissue-implementing innate immunity . Proc. of the IEEE World Congress on Computational Intelligence , 499 – 506 .
  • Ye , W. and Heidemann , J. 2004 . Medium access control in wireless sensor networks . Wireless Sensor Networks , 73 – 91 .
  • Yegneswaran , V. , Barford , P. , and Ullrich , J. 2003 . Internet intrusions: Global characteristics and prevalence . Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems , 138 – 147 .
  • Zhang , Y. , Lee , W. , and an Huang , Y. A. 2003 . Intrusion detection techniques for mobile wireless networks . Wireless Networks , 9 ( 5 ): 545 – 556 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.