Skip to main content

Adaptive Active Immune Policy for Sensor Nodes in Internet of Things

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1424))

Included in the following conference series:

  • 1672 Accesses

Abstract

The Internet of Things (IoT) is a ubiquitous network formed on the basis of the traditional Internet. The sensor layer of IoT is the bridge between the world of information and the real world. The security of the sensor network of IoT is the primary basis for the credibility of the IoT. Only when the security of the sensor network is guaranteed, the security of IoT can be guaranteed. However, the existing security mechanism is mainly based on passive defense and cannot actively respond to many unknown security threats. Therefore, it is necessary to study an active immunity mechanism suitable for IoT sensor nodes. This article will mainly design an active immune mechanism that can meet the security requirements of IoT sensor nodes for the sensor layer of IoT, and combine the relevant feedback mechanism to adjust the credibility measurement policy between nodes in real time, so that the mechanism can be adjusted in real time according to environmental changes. In this way, it is more proactive to ensure the security of the sensor network. Simulation results show that the security strategy in this paper can better deal with the security threats brought by malicious nodes than the traditional strategy, and the response time is reduced by about 50%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sedjelmaci, H., Senouci, S.M., Taleb, T.: An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 66(10), 9381–9393 (2017)

    Article  Google Scholar 

  2. Wang, J., Hong, Z., Zhang, Y., Jin, Y.: Enabling security-enhanced attestation with Intel SGX for remote terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1), 88–96 (2018)

    Article  Google Scholar 

  3. Kim, M., Lee, N., Park, J.: A security generic service interface of Internet of Things (IoT) platforms. Symmetry 9(9), 171 (2017)

    Article  Google Scholar 

  4. Mangia, M., Pareschi, F., Rovatti, R., Setti, G.: Low-cost security of IoT sensor nodes with rakeness-based Compressed sensing: statistical and known-plaintext attacks. IEEE Trans. Inf. Forensics Secur. 13(2), 327–340 (2018)

    Article  Google Scholar 

  5. Nurse, J.R.C., Creese, S., Roure, D.D.: Security risk assessment in internet of things systems. IT Professional 19(5), 20–26 (2017)

    Article  Google Scholar 

  6. Abeshu, A., Chilamkurti, N.: Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag. 10(2), 169–175 (2018)

    Article  Google Scholar 

  7. Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in Internet of Things. In: Proceedings of the Wireless VITAE 2013, pp. 1–5. IEEE, Atlantic City (2013)

    Google Scholar 

  8. Abbas, R., Shirvanimoghaddam, M., Li, Y., Vucetic, B.: Random access for M2M communications with QoS guarantees. IEEE Trans. Commun. 65(7), 2889–2903 (2017)

    Article  Google Scholar 

  9. Li, Y., Chai, K., Chen, Y., Loo, J.: Distributed access control framework for IPv6-based hierarchical Internet of Things. IEEE Wirel. Commun. 16(10), 17–23 (2016)

    Article  Google Scholar 

  10. Chen, I., Bao, F., Guo, J.: Trust-based service management for social Internet of Things systems. IEEE Trans. Dependable Secure Comput. 13(6), 684–696 (2016)

    Article  Google Scholar 

  11. Maene, P., Gotzfried, J., Clercq, R.D., Muller, T., Freiling, F.: Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput. 99(1), 1–14 (2017)

    MATH  Google Scholar 

  12. Margheri, A., Masi, M., Pugliese, R., Tiezzi, F., Rigorous, A.: Framework for specification, analysis and enforcement of access control policies. IEEE Trans. Software Eng. 99(1), 1–58 (2016)

    Google Scholar 

  13. Hussein, D., Bertin, E., Frey, V.: A community-driven access control approach in distributed IoT environments. IEEE Commun. Mag. 50(3), 146–153 (2017)

    Article  Google Scholar 

  14. MeenaKowshalyal, A., Valarmathi, M.L.: Trust management for reliable decision making among social objects in the social Internet of Things. IET Networks 6(4), 75–80 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by State Grid Technical Project “Research on key technologies of secure and reliable slice access for Energy Internet services” (5204XQ190001). The authors declare that they have no conflicts of interest to report regarding the present study.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhong, C., Lu, P., Guo, S., Kang, S. (2021). Adaptive Active Immune Policy for Sensor Nodes in Internet of Things. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78621-2_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78620-5

  • Online ISBN: 978-3-030-78621-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics