Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Distributed Danger Assessment Model for the Internet of Things Based on Immunology

1Run Chen, 1Jiliu Zhou and 2, 3Caiming Liu
1School of Computer Science, Sichuan University, Chengdu 610065, China
2School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China
3Laboratory of Intelligent Information Processing and Application, Leshan Normal University, Leshan 614000, China
Research Journal of Applied Sciences, Engineering and Technology  2013  22:5255-5259
http://dx.doi.org/10.19026/rjaset.5.4273  |  © The Author(s) 2013
Received: October 22, 2012  |  Accepted: December 19, 2012  |  Published: May 25, 2013

Abstract

The Internet of Things (IoT) confronts complicated and changeful security threats. It harms IoT and brings IoT potential danger. However, the research achievements of the danger assessment technology for IoT are rare. To calculate the danger value of IoT with many dispersive sense nodes, the theoretical model of distributed danger assessment for IoT is explored in this paper. The principles and mechanisms of Artificial Immune System (AIS) are introduced into the proposed model. Data packets in IoT are captured in each gateway and converted into antigens in the simulated immune environment. Detectors use self-learning and self-adaptation mechanisms in AIS to evolve themselves to adapt the local IoT environment and detect security threats. The mechanism of antibody density is simulated to reflect the intensity of security threats which are happening. Through the detected security threats and their intensity, the values of IoT property and security threats’ harm are combined to assess the quantitative value of danger for IoT. Theoretical analysis shows that the proposed model is significative of theory and practice.

Keywords:

Artificial immune system, danger assessment, internet of things, security threat,


References


Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved