Show simple item record

dc.contributor.convenorAruna Seneviratne
dc.contributor.authorUsman, Muhammad
dc.contributor.editorAruna Seneviratne
dc.date.accessioned2017-06-19T01:31:07Z
dc.date.available2017-06-19T01:31:07Z
dc.date.issued2014
dc.identifier.refurihttp://wowmom14.conference.nicta.com.au/
dc.identifier.doi10.1109/WoWMoM.2014.6918934
dc.identifier.urihttp://hdl.handle.net/10072/65322
dc.description.abstractThe state-of-the-art network anomaly detection systems are often unable to correctly verify source of anomalies; they have occurred in situ or in transit. To address this issue, this study proposes an agent-enabled anomaly detection system in which mobile agents perform in situ verification of sensor nodes to verify source of anomalies. Moreover, mobile agent cannot be freely transmitted over the network, as transmission is several hundred times expensive operation as compare to processing. We optimize agent transmission through 2-sigma method. The formal behavior analysis of 2-sigma method is performed using Petri net theory to analyze its correctness. In future work, we aim to exploit cross-layer (XL) interaction to efficiently transmit mobile agent and perform quantitative analysis through experimental study.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent499778 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherIEEE
dc.publisher.placeUnited States
dc.publisher.urihttp://wowmom14.conference.nicta.com.au/
dc.relation.ispartofstudentpublicationY
dc.relation.ispartofconferencenameWoWMoM 2014
dc.relation.ispartofconferencetitleA World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on
dc.relation.ispartofdatefrom2014-06-16
dc.relation.ispartofdateto2014-06-19
dc.relation.ispartoflocationSydney, Australia
dc.rights.retentionY
dc.subject.fieldofresearchOther information and computing sciences not elsewhere classified
dc.subject.fieldofresearchcode469999
dc.titleAgent-enabled Anomaly Detection in Resource Constrained Wireless Sensor Networks
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Sciences, Griffith School of Engineering
gro.rights.copyright© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
gro.date.issued2015-03-13T04:19:13Z
gro.hasfulltextFull Text
gro.griffith.authorUsman, Muhammad


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record