On the Deployment of Artificial Immune Systems for Biometrics

Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 99)


Artificial immune systems (AIS) are a computational metaphor based on biological implementations of immune systems. Natural immune systems are capable of performing computation based on several properties that they possess. Immune systems are capable of adapting to new stimuli – they respond appropriately to novel stimuli, and they can remember previous encounters with stimuli. The processes which natural immune systems utilise are a combination of cellular and humoral responses – which act independently and in concert to perform stimulus identification and eradication, with minimal impact on the host. This provides an overview of artificial immune systems – which attempt to implement the basic functionality of natural systems. The basic properties and their interrelations are described in this paper – which is a prelude to their application in the context of biometrics. It will be demonstrated that the AIS approach is both a natural and potentially very effective approach to providing biometric security within a range of modalities.


artificial immune systems biometrics computer security distributed systems natural computation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: SP 1994: Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 202–212. IEEE Computer Society, Washington, DC (1994)CrossRefGoogle Scholar
  2. 2.
    Ebner, M.m, Breunig, H-G., Albert, J.: On the use of negative selection in an artificial immune system. In: GECCO 2002 Proceedings of the Genetic and Evolutionary Computation, pp. 957–964. Morgan Kaufmann (2002)Google Scholar
  3. 3.
    Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 7(1), 45–68 (2000)Google Scholar
  4. 4.
    Wang, L., Jiao, L.: The immune genetic algorithm and its convergence. In: Fourth International Signal Processing Proceedings, pp. 1347–1350 (1998)Google Scholar
  5. 5.
    Chun, J., Kim, M., Jung, H., Hong, S.: Shape optimization of electromagnetic devices using immune algorithm. IEEE Transactions on Magnetics 33(2), 1876–1879 (1997)CrossRefGoogle Scholar
  6. 6.
    Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune System Approaches to Intrusion Detection – A Review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Kephart, J.O.: A biologically inspired immune system for computers. In: Brooks, R.A., Maes, P. (eds.) Artificial Life IV: Proc. of the 4th Int. Workshop on the Synthesis and Simulation of Living Systems, pp. 130–139. MIT PressGoogle Scholar
  8. 8.
    Hofmeyr, S.A., Forrest, S.: Immunity by design: an artificial immune system. In: Proc. of the Genetic and Evolutionary Computation Conference, pp. 1289–1296. Morgan KaufmannGoogle Scholar
  9. 9.
    Bradley, D., Tyrrell, A.: A hardware immune system for benchmark state machine error detection. In: Proceedings of the 2002 Congress on Evolutionary Computing, vol. 1, pp. 813–818 (2002)Google Scholar
  10. 10.
    Knight, T., Timmis, J.: Aine: An immunological approach to data mining. In: ICDM 2001: Proceedings of the 2001 IEEE International Conference on Data Mining, pp. 297–304. IEEE Computer Society, Washington, DC (2001)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  1. 1.School of Computing & TechnologyUniversity of East LondonLondonUK
  2. 2.Faculty of Informatics and Computer ScienceBritish University in EgyptEl Sherouk CityEgypt

Personalised recommendations