Abnormality Identification and Confirmation System

  • Muhammad UsmanEmail author
  • Vallipuram Muthukkumarasamy
  • Xin-Wen Wu
  • Surraya Khanum


Abnormalities can severely disrupt the performance of a sensor network application. In a worst-case scenario, abnormalities caused by attacks or faults can completely halt the functioning of a sensor network application. The timely detection of abnormalities and then identification of the source of abnormalities are, therefore, imperative for their effective mitigation. This chapter has introduced an abnormality identification and confirmation system which can not only timely detect the different nature of abnormalities, but also effectively identify the source of abnormalities.


  1. 1.
    F. Ahmad, S.A. Khan, Specification and verification of safety properties along a crossing region in a railway network control. Appl. Math. Model. 37(7), 5162–5170 (2013)CrossRefGoogle Scholar
  2. 2.
    J.L. Peterson, Petri Net Theory and the Modeling of Systems, 1st edn. (Prentice Hall, Englewood Clis, N. J., USA, 1981)zbMATHGoogle Scholar
  3. 3.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, A resource-efficient system for detection and verification of anomalies using mobile agents in wireless sensor networks. J. Netw. 9(12), 3427–3444 (2014)Google Scholar
  4. 4.
    J.C. Dagher, M.W. Marcellin, M.A. Neifeld, A theory for maximizing the lifetime of sensor networks. IEEE Trans. Commun. 55(2), 323–332 (2007)CrossRefGoogle Scholar
  5. 5.
    J. Waterman, G.W. Challen, M. Welsh, Peloton: Coordinated resource management for sensor networks, (Switzerland, 2009), pp. 1–5Google Scholar
  6. 6.
    O. Esparza, J.L. Munoz, J. Tomas-Builart, M. Soriano, An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking. Wirel. Commun. Mob. Comput. 11(11), 1446–1462 (2011)CrossRefGoogle Scholar
  7. 7.
    C. Muldoon, G.M.P. OHare, R. Collier, M.J. OGrady, Agent factory micro edition: a framework for ambient applications, in Computational Science, ed. by V.N. Alexandrov, G.D. van Albada, P.M.A. Sloot, J. Dongarra. Lecture Notes in Computer Science, vol. 3993 (Springer Berlin Heidelberg, 2006), pp. 727–734Google Scholar
  8. 8.
    D.E. Denning, An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2), 222–232 (1987)Google Scholar
  9. 9.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, Specification and validation of enhanced mobile agent-enabled anomaly detection in resource constrained networks. J. Netw. 10(6), 353–368 (2015)Google Scholar
  10. 10.
    Part 15.4: Wireless Medium Access (MAC) and, Physical Layer (PHY) specications for low-rate wireless Personal Area Network (LR-WPANs). IEEE Std. 802(15), 4 (2006)Google Scholar
  11. 11.
    J. Polastre, R.Szewczyk, C. Sharp, D. Culler, The mote revolution: low power wireless sensor network devices, in Proceeding of the Hot Chips (2004)Google Scholar
  12. 12.
    A.M. Marsan, G. Conte, G. Balbo, A class of generalized stochastic petri nets for the performance evaluation of multiprocessor systems. ACM Trans. Comput. Syst. 2(2), 93–122 (1984)CrossRefGoogle Scholar
  13. 13.
    C. Lino, C. T. Calafate, A. Diaz-Ramirez, P. Manzoni, J.-C. Cano, Studying the feasibility of ieee 802.15.4 based wsns for gas and re tracking applications through simulation, in Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN), (2011), pp. 875–881Google Scholar
  14. 14.
    E.U. Gaura, J. Brusey, R. Wilins, J. Barnham, in Wireless sensing for the built environment: enabling innovation towards greener, healthier homes (United Kingdom, 2011), pp. 1–6Google Scholar
  15. 15.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, S. Khanum, Wireless smart home sensor networks: mobile agent based anomaly detection, in Proceedings of the 9th IEEE International Conference on Ubiquitous Intelligence Computing and 9th International Conference on Autonomic Trusted Computing (UIC/ATC), Sept 2012, pp. 322–329Google Scholar
  16. 16.
    M. Usman, Agent-enabled anomaly detection in resource constrained wireless sensor networks, in Proceedings of the 15th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 2014, pp. 1–2Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Muhammad Usman
    • 1
    Email author
  • Vallipuram Muthukkumarasamy
    • 2
  • Xin-Wen Wu
    • 2
  • Surraya Khanum
    • 1
  1. 1.Department of Computer SciencesQuaid-I-Azam UniversityIslamabadPakistan
  2. 2.School of Information and Communication TechnologyGriffith UniversityGold CoastAustralia

Personalised recommendations