Caiming Liu, Yan Zhang, Jinquan Zeng, Lingxi Peng, Run Chen
{"title":"Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology","authors":"Caiming Liu, Yan Zhang, Jinquan Zeng, Lingxi Peng, Run Chen","doi":"10.1109/ICNC.2012.6234533","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) confronts a complicated and changeful attack environment. It is necessary to evaluate the security risk of IoT dynamically to judge the situation of IoT. To resolve the above problem, a dynamical risk assessment method for IoT inspired by Artificial Immune System is proposed in this paper. The proposed method is made up of Detection Agent of Attack and Sub-system of Dynamical Risk Assessment. Furthermore, it adopts the technology of detector distribution. The simulation of immune principles and mechanisms in the real IoT environment is deduced by set theory in math. The attack detector evolves dynamically in the IoT immune environment. Its change forms the dynamical security risk value of IoT.","PeriodicalId":404981,"journal":{"name":"2012 8th International Conference on Natural Computation","volume":"235 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"43","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 8th International Conference on Natural Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNC.2012.6234533","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 43
Abstract
The Internet of Things (IoT) confronts a complicated and changeful attack environment. It is necessary to evaluate the security risk of IoT dynamically to judge the situation of IoT. To resolve the above problem, a dynamical risk assessment method for IoT inspired by Artificial Immune System is proposed in this paper. The proposed method is made up of Detection Agent of Attack and Sub-system of Dynamical Risk Assessment. Furthermore, it adopts the technology of detector distribution. The simulation of immune principles and mechanisms in the real IoT environment is deduced by set theory in math. The attack detector evolves dynamically in the IoT immune environment. Its change forms the dynamical security risk value of IoT.