• Muhammad UsmanEmail author
  • Vallipuram Muthukkumarasamy
  • Xin-Wen Wu
  • Surraya Khanum


The number of state-of-the-art sensor network applications has been increasing with the passage of time due to advancements in the broader field of the information technology. This has increased the demand of the design and development of innovative services to cater for the unique requirements of the sensor network applications.


  1. 1.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, S. Khanum, Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends (Auerbach publications Taylor and Francis Group, USA, in security for multihop wireless networks edition, 2014)Google Scholar
  2. 2.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, Specification and validation of enhanced mobile agent-enabled anomaly detection in resource constrained networks. J. Netw. 10(6), 353–368 (2015)Google Scholar
  3. 3.
    S.I. Eludiora, O.O. Abiona, A.O. Oluwatope, S.A. Bello, M.L. Sanni, D.O. Ayanda, C.E. Onime, E.R. Adagunodo, L.O. Kehinde, A distributed intrusion detection scheme for wireless sensor networks, in IEEE International Conference on Electro/Information Technology (EIT) (2011), pp. 1–5Google Scholar
  4. 4.
    S. Khanum, M. Usman, A. Alwabel, Mobile agent based hierarchical intrusion detection system in wireless sensor networks. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 101–108 (2012)Google Scholar
  5. 5.
    M. Usman, V. Muthukkumarsamy, X.W. Wu, S. Khanum, Wireless smart home sensor networks: mobile agent based anomaly detection, in Proceedings of the 9th IEEE International Conference on Ubiquitous Intelligence Computing and 9th International Conference on Autonomic Trusted Computing (UIC/ATC) (2012), pp. 322–329Google Scholar
  6. 6.
    M. Usman, Agent-enabled anomaly detection in resource constrained wireless sensor networks, in Proceedings of the 15th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2014), pp. 1–2Google Scholar
  7. 7.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, A resource-efficient system for detection and verification of anomalies using mobile agents in wireless sensor networks. J. Netw. 9(12), 3427–3444 (2014)Google Scholar
  8. 8.
    M. Ketel, Applying the mobile agent paradigm to distributed intrusion detection in wireless sensor networks, in 40th Southeastern Symposium on System Theory (2008), pp. 74–78Google Scholar
  9. 9.
    M. Usman, V. Muthukkumarsamy, X.-W. Wu, Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic. IEEE Trans. Consum. Electron. 61(2), 197–205 (2015)Google Scholar
  10. 10.
    M. Pugliese, A. Giani, F. Santucci, Weak process models for attack detection in a clustered sensor network using mobile agents, in Sensor Systems and Software, vol. 24, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ed. by S. Hailes, S. Sicari, G. Roussos (Springer, Heidelberg, 2010), pp. 33–50CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Muhammad Usman
    • 1
    Email author
  • Vallipuram Muthukkumarasamy
    • 2
  • Xin-Wen Wu
    • 2
  • Surraya Khanum
    • 1
  1. 1.Department of Computer SciencesQuaid-I-Azam UniversityIslamabadPakistan
  2. 2.School of Information and Communication TechnologyGriffith UniversityGold CoastAustralia

Personalised recommendations