Abstract
As highlighted in the preceding chapters, the motes and their transmitted data are susceptible to on-the-spot and in transmission abnormalities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Ketel, Applying the mobile agent paradigm to distributed intrusion detection in wireless sensor networks, in 40th Southeastern Symposium on System Theory, pp. 74–78, March 2008
M. Pugliese, A. Giani, F. Santucci, Weak process models for attack detection in a clustered sensor network using mobile agents, in Sensor Systems and Software, vol. 24, ed. by S. Hailes, S. Sicari, G. Roussos. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, (Springer, Berlin, 2010), pp. 33–50
S. Khanum, M. Usman, A. Alwabel, Mobile agent based hierarchical intrusion detection system in wireless sensor networks. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 101–108 (2012)
K. Kapitanova, S.H. Son, K.D. Kang, Using fuzzy logic for robust event detection in wireless sensor networks. Ad Hoc Netw. 10(4), 709–722 (2012)
M. Usman, V. Muthukkumarsamy, X.-W. Wu, Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic. IEEE Trans. Consum. Electron. 61(2), 197–205, 2015b
R. Alsaqour, M. Abdelhaq, R. Saeed, M. Uddin, O. Alsukour, M. Al-Hubaishi, M. Alahdal, Dynamic packet beaconing for gpsr mobile ad hoc position-based routing protocol using fuzzy logic. J. Netw. Comput. Appl. 47, 32 (2015)
L. Tang, K.C. Wang, F. Huang, Y. Gu, Channel characterization and link quality assessment of ieee 802.15.4-compliant radio for factory environments. IEEE Trans. Ind. Inform. 3(2), 99–110 (2007)
D.-I. Curiac, O. Banias, F. Dragan, C. Volosencu, O. Dranga, Malicious node detection in wireless sensor networks using an autoregression technique, in Third International Conference on Networking and Services, pp. 83–83, June 2007
S. Nanz, C. Hankin, A framework for security analysis of mobile wireless networks. Theor. Comput. Sci. 367(1–2), 203–227 (2006)
M. Moshtaghi, C. Leckie, S. Karunasekera, S. Rajasegarar, An adaptive elliptical anomaly detection model for wireless sensor networks. Comput. Netw. 64, 195–207, 2014a
S. Rajasegarar, C. Leckie, J.C. Bezdek, M. Palaniswami, Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Trans. Inf. Forensics Secur. 5(3), 518–533 (2010)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Usman, M., Muthukkumarasamy, V., Wu, XW., Khanum, S. (2018). Cross-Layer Identification and Transmission of Agent Using Fuzzy Logic. In: Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7467-7_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-7467-7_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7466-0
Online ISBN: 978-981-10-7467-7
eBook Packages: Computer ScienceComputer Science (R0)