Advertisement

First-Order Abnormalities: Agent Transmission Optimization

  • Muhammad UsmanEmail author
  • Vallipuram Muthukkumarasamy
  • Xin-Wen Wu
  • Surraya Khanum
Chapter
  • 440 Downloads

Abstract

The system, presented in the preceding chapter, is not only able to identify different types of abnormalities, but also empowers agents to use the synchronized resource management scheme information to carry out on-the-spot diagnosis of the member motes to discover the origin of abnormalities.

References

  1. 1.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, A resource-efficient system for detection and verification of anomalies using mobile agents in wireless sensor networks. J. Netw. 9(12), 3427–3444 (2014b)Google Scholar
  2. 2.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, S. Khanum, Wireless smart home sensor networks: mobile agent based anomaly detection, in Proceedings of the 9th IEEE International Conference on Ubiquitous Intelligence Computing and 9th International Conference on Autonomic Trusted Computing (UIC/ATC), September 2012, pp. 322–329Google Scholar
  3. 3.
    A. Varga, The omnet++ discrete event simulation system, in Proceeding of the European Simulation Multiconference (2001), p. 7Google Scholar
  4. 4.
    J. Polastre, R. Szewczyk, C. Sharp, D. Culler, The mote revolution: low power wireless sensor network devices, in Proceeding of the Hot Chips (2004)Google Scholar
  5. 5.
    W.B. Hinzelman, A.P. Chandrakasan, H. Balakrishnan, An application-specic protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 660–670 (2002)CrossRefGoogle Scholar
  6. 6.
    J.C. Dagher, M.W. Marcellin, M.A. Neifeld, A theory for maximizing the lifetime of sensor networks. IEEE Trans. Commun. 55(2), 323–332 (2007)CrossRefGoogle Scholar
  7. 7.
    Part 15.4: Wireless Medium Access (MAC) and 2006 Physical Layer (PHY) specications for low-rate wireless Personal Area Network (LR-WPANs), IEEE Std. 802.15.4Google Scholar
  8. 8.
    D.H. Stamatis, Six Sigma and Beyond: Statistics and Probability, vol. III (CRC Press, USA, 2002)Google Scholar
  9. 9.
    P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, D. Culler, Tinyos: an operating system for sensor networks, in Ambient Intelligence, ed. by W. Weber, J. Rabaey, E. Aarts (Springer, Berlin Heidelberg, 2005), pp. 115–148Google Scholar
  10. 10.
    D. Gay, P. Levis, R. Von Behren, M. Welsh, E. Brewer, D. Culler, The nesc language: a holistic approach to networked embedded systems, in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (2003), pp. 1–11Google Scholar
  11. 11.
    M. Ketel, Applying the mobile agent paradigm to distributed intrusion detection in wireless sensor networks, in 40th Southeastern Symposium on System Theory, March 2008, pp. 74–78Google Scholar
  12. 12.
    S.I. Eludiora, O.O. Abiona, A.O. Oluwatope, S.A. Bello, M.L. Sanni, D.O. Ayanda, C.E. Onime, E.R. Adagunodo, L.O. Kehinde. A distributed intrusion detection scheme for wireless sensor networks, in IEEE International Conference on Electro/Information Technology (EIT), May 2011, pp. 1–5Google Scholar
  13. 13.
    S. Khanum, M. Usman, A. Alwabel, Mobile agent based hierarchical intrusion detection system in wireless sensor networks. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 101–108 (2012)Google Scholar
  14. 14.
    D. Wagner, Resilient aggregation in sensor networks, in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004), pp. 78–87Google Scholar
  15. 15.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, Specification and validation of enhanced mobile agent-enabled anomaly detection in resource constrained networks. J. Netw. 10(6), 353–368 (2015a)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Muhammad Usman
    • 1
    Email author
  • Vallipuram Muthukkumarasamy
    • 2
  • Xin-Wen Wu
    • 2
  • Surraya Khanum
    • 1
  1. 1.Department of Computer SciencesQuaid-I-Azam UniversityIslamabadPakistan
  2. 2.School of Information and Communication TechnologyGriffith UniversityGold CoastAustralia

Personalised recommendations