메뉴 건너뛰기




Volumn 36, Issue 1, 2011, Pages 1-26

Collaborative RFID intrusion detection with an artificial immune system

Author keywords

Artificial immune system (AIS); Collaborative intrusion detection; Immune based clustering; Negative selection; Radio Frequency IDentification (RFID)

Indexed keywords

ADAPTIVE DETECTORS; ARTIFICIAL IMMUNE SYSTEM; BIOLOGICAL IMMUNE SYSTEM; COLLABORATIVE INTRUSION DETECTION; DANGER SIGNALS; DATA MODELS; DETECTION RATES; FALSE DETECTIONS; IMMUNE BASED CLUSTERING; IMMUNE CELLS; INTRUSION DETECTION METHOD; NEGATIVE SELECTION; NEGATIVE SELECTION ALGORITHM; PHYSICAL PROTECTION; RFID ATTACKS; RFID SYSTEMS; SIMULATION RESULT; TECHNICAL STANDARDS;

EID: 79951556944     PISSN: 09259902     EISSN: 15737675     Source Type: Journal    
DOI: 10.1007/s10844-010-0118-3     Document Type: Article
Times cited : (22)

References (29)
  • 4
    • 84979828637 scopus 로고    scopus 로고
    • Roadmap to solving security and privacy concerns in RFID systems
    • DOI 10.1016/j.clsr.2007.09.005, PII S026736490700091X
    • J Ayoade 2007 Privacy and RFID systems: Roadmap to solving security and privacy concerns in RFID systems Comput (Pubitemid 350026134)
    • (2007) Computer Law and Security Report , vol.23 , Issue.6 , pp. 555-561
    • Ayoade, J.1
  • 11
    • 79951556997 scopus 로고    scopus 로고
    • Double-signal based immune intrusion detection model inspired by danger theory
    • 2530474 (in Chinese)
    • H Fu X Li 2008 Double-signal based immune intrusion detection model inspired by danger theory Computer Engineering and Applications 44 14 113 117 2530474 (in Chinese)
    • (2008) Computer Engineering and Applications , vol.44 , Issue.14 , pp. 113-117
    • Fu, H.1    Li, X.2
  • 12
    • 66349123017 scopus 로고    scopus 로고
    • Intrusion detection model for RFID system based on immune network
    • 1181.68025 10.3724/SP.J.1087.2008.02481 (in Chinese)
    • J Guo H Yang F Deng 2008 Intrusion detection model for RFID system based on immune network Journal of Computer Applications 28 10 2481 2484 1181.68025 10.3724/SP.J.1087.2008.02481 (in Chinese)
    • (2008) Journal of Computer Applications , vol.28 , Issue.10 , pp. 2481-2484
    • Guo, J.1    Yang, H.2    Deng, F.3
  • 13
    • 32444433467 scopus 로고    scopus 로고
    • Department of Computer Science, University of New Mexico. Available at
    • Hofmeyr, S. (2000). An interpretative introduction to the immune system. Department of Computer Science, University of New Mexico. Available at http://www.cs.unm.edu/~steveah/imm-overview-new.pdf.
    • (2000) An Interpretative Introduction to the Immune System
    • Hofmeyr, S.1
  • 14
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • 10.1162/106365600568257
    • S Hofmeyr S Forrest 2000 Architecture for an artificial immune system Evolutionary Computation 8 4 443 473 10.1162/106365600568257
    • (2000) Evolutionary Computation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.1    Forrest, S.2
  • 15
    • 79951553068 scopus 로고    scopus 로고
    • Worm containment model based on negative selection
    • (in Chinese)
    • Z Hong L Wu Y Wang 2008 Worm containment model based on negative selection Computer Engineering 34 7 126 128 (in Chinese)
    • (2008) Computer Engineering , vol.34 , Issue.7 , pp. 126-128
    • Hong, Z.1    Wu, L.2    Wang, Y.3
  • 16
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A Juels 2006 RFID security and privacy: A research survey IEEE Journal on Selected Areas in Communications 24 2 381 395 10.1109/JSAC.2005.861395 2197471 (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 17
    • 5144229744 scopus 로고    scopus 로고
    • A novel clustering method with network structure based on clonal algorithm
    • (in Chinese)
    • J Li X Gao L Jiao 2004 A novel clustering method with network structure based on clonal algorithm ACTA Electronica Sinica 32 7 1195 1199 (in Chinese)
    • (2004) ACTA Electronica Sinica , vol.32 , Issue.7 , pp. 1195-1199
    • Li, J.1    Gao, X.2    Jiao, L.3
  • 18
    • 0027609384 scopus 로고
    • Survey of intrusion detection techniques
    • DOI 10.1016/0167-4048(93)90029-5
    • T Lunt 1993 A survey of intrusion detection techniques Computers Security 12 1 405 418 10.1016/0167-4048(93)90029-5 (Pubitemid 23707839)
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt Teresa, F.1
  • 19
    • 0028201732 scopus 로고
    • Tolerance, danger and the extended family
    • P Matzinger 1994 Tolerance, danger and the extended family Annual Review of Immunology 12 991 1045
    • (1994) Annual Review of Immunology , vol.12 , pp. 991-1045
    • Matzinger, P.1
  • 22
    • 0003602325 scopus 로고
    • MIT Laboratory for Computer Science and RSA Data Security, Inc. Available at
    • Rivest, R. (1992). The MD5 message-digest algorithm. MIT Laboratory for Computer Science and RSA Data Security, Inc. Available at http://www.ietf.org/ rfc/rfc1321.txt.
    • (1992) The MD5 Message-digest Algorithm
    • Rivest, R.1
  • 23
    • 42549157259 scopus 로고    scopus 로고
    • A framework for assessing RFID system security and privacy risks
    • DOI 10.1109/MPRV.2008.22, 4487091
    • P Rotter 2008 A framework for assessing RFID system security and privacy risks IEEE Pervasive Computing 7 2 70 77 10.1109/MPRV.2008.22 (Pubitemid 351575124)
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.2 , pp. 70-77
    • Rotter, P.1
  • 28
    • 79951549933 scopus 로고    scopus 로고
    • Research and design of adaptive intrusion prevention system for co-stimulated by danger signals
    • (in Chinese)
    • H Xu C Xu X Cheng Z Peng 2009 Research and design of adaptive intrusion prevention system for co-stimulated by danger signals Computer Engineering 35 2 172 174 (in Chinese)
    • (2009) Computer Engineering , vol.35 , Issue.2 , pp. 172-174
    • Xu, H.1    Xu, C.2    Cheng, X.3    Peng, Z.4
  • 29
    • 78249266826 scopus 로고    scopus 로고
    • Negative-selection algorithm of mutation search in self space to train detector
    • (in Chinese)
    • Q Zhang Y Qian B Xu T Gao K Xie 2007 Negative-selection algorithm of mutation search in self space to train detector Journal of Computer Applications 27 3 627 629 (in Chinese)
    • (2007) Journal of Computer Applications , vol.27 , Issue.3 , pp. 627-629
    • Zhang, Q.1    Qian, Y.2    Xu, B.3    Gao, T.4    Xie, K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.