Skip to main content

Abstract

The number of state-of-the-art sensor network applications has been increasing with the passage of time due to advancements in the broader field of the information technology. This has increased the demand of the design and development of innovative services to cater for the unique requirements of the sensor network applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Usman, V. Muthukkumarsamy, X.-W. Wu, S. Khanum, Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends (Auerbach publications Taylor and Francis Group, USA, in security for multihop wireless networks edition, 2014)

    Google Scholar 

  2. M. Usman, V. Muthukkumarsamy, X.-W. Wu, Specification and validation of enhanced mobile agent-enabled anomaly detection in resource constrained networks. J. Netw. 10(6), 353–368 (2015)

    Google Scholar 

  3. S.I. Eludiora, O.O. Abiona, A.O. Oluwatope, S.A. Bello, M.L. Sanni, D.O. Ayanda, C.E. Onime, E.R. Adagunodo, L.O. Kehinde, A distributed intrusion detection scheme for wireless sensor networks, in IEEE International Conference on Electro/Information Technology (EIT) (2011), pp. 1–5

    Google Scholar 

  4. S. Khanum, M. Usman, A. Alwabel, Mobile agent based hierarchical intrusion detection system in wireless sensor networks. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 101–108 (2012)

    Google Scholar 

  5. M. Usman, V. Muthukkumarsamy, X.W. Wu, S. Khanum, Wireless smart home sensor networks: mobile agent based anomaly detection, in Proceedings of the 9th IEEE International Conference on Ubiquitous Intelligence Computing and 9th International Conference on Autonomic Trusted Computing (UIC/ATC) (2012), pp. 322–329

    Google Scholar 

  6. M. Usman, Agent-enabled anomaly detection in resource constrained wireless sensor networks, in Proceedings of the 15th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2014), pp. 1–2

    Google Scholar 

  7. M. Usman, V. Muthukkumarsamy, X.-W. Wu, A resource-efficient system for detection and verification of anomalies using mobile agents in wireless sensor networks. J. Netw. 9(12), 3427–3444 (2014)

    Google Scholar 

  8. M. Ketel, Applying the mobile agent paradigm to distributed intrusion detection in wireless sensor networks, in 40th Southeastern Symposium on System Theory (2008), pp. 74–78

    Google Scholar 

  9. M. Usman, V. Muthukkumarsamy, X.-W. Wu, Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic. IEEE Trans. Consum. Electron. 61(2), 197–205 (2015)

    Google Scholar 

  10. M. Pugliese, A. Giani, F. Santucci, Weak process models for attack detection in a clustered sensor network using mobile agents, in Sensor Systems and Software, vol. 24, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ed. by S. Hailes, S. Sicari, G. Roussos (Springer, Heidelberg, 2010), pp. 33–50

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Usman .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Usman, M., Muthukkumarasamy, V., Wu, XW., Khanum, S. (2018). Conclusions. In: Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7467-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7467-7_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7466-0

  • Online ISBN: 978-981-10-7467-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics