Abstract
The number of state-of-the-art sensor network applications has been increasing with the passage of time due to advancements in the broader field of the information technology. This has increased the demand of the design and development of innovative services to cater for the unique requirements of the sensor network applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Usman, V. Muthukkumarsamy, X.-W. Wu, S. Khanum, Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends (Auerbach publications Taylor and Francis Group, USA, in security for multihop wireless networks edition, 2014)
M. Usman, V. Muthukkumarsamy, X.-W. Wu, Specification and validation of enhanced mobile agent-enabled anomaly detection in resource constrained networks. J. Netw. 10(6), 353–368 (2015)
S.I. Eludiora, O.O. Abiona, A.O. Oluwatope, S.A. Bello, M.L. Sanni, D.O. Ayanda, C.E. Onime, E.R. Adagunodo, L.O. Kehinde, A distributed intrusion detection scheme for wireless sensor networks, in IEEE International Conference on Electro/Information Technology (EIT) (2011), pp. 1–5
S. Khanum, M. Usman, A. Alwabel, Mobile agent based hierarchical intrusion detection system in wireless sensor networks. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 101–108 (2012)
M. Usman, V. Muthukkumarsamy, X.W. Wu, S. Khanum, Wireless smart home sensor networks: mobile agent based anomaly detection, in Proceedings of the 9th IEEE International Conference on Ubiquitous Intelligence Computing and 9th International Conference on Autonomic Trusted Computing (UIC/ATC) (2012), pp. 322–329
M. Usman, Agent-enabled anomaly detection in resource constrained wireless sensor networks, in Proceedings of the 15th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2014), pp. 1–2
M. Usman, V. Muthukkumarsamy, X.-W. Wu, A resource-efficient system for detection and verification of anomalies using mobile agents in wireless sensor networks. J. Netw. 9(12), 3427–3444 (2014)
M. Ketel, Applying the mobile agent paradigm to distributed intrusion detection in wireless sensor networks, in 40th Southeastern Symposium on System Theory (2008), pp. 74–78
M. Usman, V. Muthukkumarsamy, X.-W. Wu, Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic. IEEE Trans. Consum. Electron. 61(2), 197–205 (2015)
M. Pugliese, A. Giani, F. Santucci, Weak process models for attack detection in a clustered sensor network using mobile agents, in Sensor Systems and Software, vol. 24, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ed. by S. Hailes, S. Sicari, G. Roussos (Springer, Heidelberg, 2010), pp. 33–50
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Usman, M., Muthukkumarasamy, V., Wu, XW., Khanum, S. (2018). Conclusions. In: Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7467-7_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-7467-7_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7466-0
Online ISBN: 978-981-10-7467-7
eBook Packages: Computer ScienceComputer Science (R0)