A Comparative Study on Self-tolerant Strategies for Hardware Immune Systems

  • Xin Wang
  • Wenjian Luo
  • Xufa Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4163)


Self-Tolerance is a key issue in Hardware Immune Systems. Two novel detector set updating strategies are proposed in this paper as approaches to the self-tolerant problem in Hardware Immune Systems. Compared with previous detector set updating strategies, results of simulation experiments show that the detector sets being updated by the new strategies are less affected by the growing of the self set, and have a better coverage on the non-self space. Moreover, the improvement is notable when the self set is unavailable during the updating of the detector set.


Artificial Immune System Filtration Process Special Symbol Concurrent Error Detection Negative Selection Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bradley, D.W., Tyrrell, A.M.: Immunotronics - Novel Finite-State-Machine Architectures with Built-In Self-Test Using Self-Nonself Differentiation. IEEE Transactions on Evolutionary Computation 6(3), 227–238 (2002)CrossRefGoogle Scholar
  2. 2.
    Tyrrell, A.M.: Computer Know Thy Self!: A Biological Way to Look at Fault Tolerance. In: Proceedings of 2nd EuroMicro / IEEE Workshop Dependable Computing Systems, pp. 129–135 (1999)Google Scholar
  3. 3.
    Canham, R., Tyrrell, A.M.: A Learning, Multi-layered, Hardware Artificial Immune System Implemented upon an Embryonic Array. In: Tyrrell, A.M., Haddow, P.C., Torresen, J. (eds.) ICES 2003. LNCS, vol. 2606, pp. 174–185. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Canham, R., Jackson, A.H., Tyrrell, A.M.: Robot Error Detection Using an Artificial Immune System. In: Proceedings of NASA/DoD Conference on Evolvable Hardware, pp. 199–207 (2003)Google Scholar
  5. 5.
    Bradley, D.W., Tyrrell, A.M.: The Architecture for a Hardware Immune System. In: Proceedings of 3rd NASA/ DoD Workshop on Evolvable Hardware. Long Beach, Cailfornia, pp. 193–200 (2001)Google Scholar
  6. 6.
    Bradley, D.W., Tyrrell, A.M.: A Hardware Immune System for Benchmark State Machine Error Detection. In: Proceedings of 2002 Congress on Evolutionary Computation, Honolulu, USA (2002)Google Scholar
  7. 7.
    Tarakanov, A., Dasgupta, D.: An Immunochip Architecture and Its Emulation. In: Proceedings of NASA/DoD Conference on Evolvable Hardware, pp. 261–265 (2002)Google Scholar
  8. 8.
    Luo, W., Wang, X., Tan, Y., Zhang, Y., Wang, X.: An Adaptive Self-tolerant Algorithm for Hardware Immune System. In: Moreno, J.M., Madrenas, J., Cosp, J. (eds.) ICES 2005. LNCS, vol. 3637, pp. 1–11. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Wang, X., Luo, W., Wang, X.: Research on an Algorithm with Self-Tolerant Ability in Hardware Immune System (in Chinese). Journal of System Simulation 18(5), 1151–1153 (2006)Google Scholar
  10. 10.
    Zeng, C., Saxena, N., McCluskey, E.J.: Finite State Machine Synthesis with Concurrent Error Detection. In: Proceedings of International Test Conference, pp. 672–679 (1999)Google Scholar
  11. 11.
    Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proceedings of 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, pp. 202–212 (1994)Google Scholar
  12. 12.
    D’haeseleer, P., Forrest, S., Helman, P.: An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, pp. 110–119 (1996)Google Scholar
  13. 13.
    D’haeseleer, P.: Further Efficient Algorithms for Generating Antibody Strings. Tech. Rep. CS95-3. Dept. Comput. Sci., Univ. New Mexico (1995)Google Scholar
  14. 14.
    Zhou, J., Dasgupata, D.: Augmented Negative Selection Algorithm with Variable-Coverage Detectors. In: Proceedings of Congress on Evolutionary Computation, CEC, vol. 1, pp. 1081–1088 (2004)Google Scholar
  15. 15.
    Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., et al. (eds.) GECCO 2004. LNCS, vol. 3103, pp. 287–298. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  16. 16.
    Zhang, H., Wu, L., Zhang, Y., Zeng, Q.: An Algorithm of r-Adjustable Negative Selection Algorithm and Its Simulation Analysis (in Chinese). Chinese Journal of Computers 28(10), 1614–1619 (2005)Google Scholar
  17. 17.
    Zhou, G.: Principles of Immunology (in Chinese). Scientific and Technical Documents Publishing House, Shanghai (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Xin Wang
    • 1
  • Wenjian Luo
    • 1
  • Xufa Wang
    • 1
  1. 1.Department of Computer Science and TechnologyUniversity of Science and Technology of ChinaHefeiChina

Personalised recommendations