dc.contributor.convenor | Aruna Seneviratne | |
dc.contributor.author | Usman, Muhammad | |
dc.contributor.editor | Aruna Seneviratne | |
dc.date.accessioned | 2017-06-19T01:31:07Z | |
dc.date.available | 2017-06-19T01:31:07Z | |
dc.date.issued | 2014 | |
dc.identifier.refuri | http://wowmom14.conference.nicta.com.au/ | |
dc.identifier.doi | 10.1109/WoWMoM.2014.6918934 | |
dc.identifier.uri | http://hdl.handle.net/10072/65322 | |
dc.description.abstract | The state-of-the-art network anomaly detection systems are often unable to correctly verify source of anomalies; they have occurred in situ or in transit. To address this issue, this study proposes an agent-enabled anomaly detection system in which mobile agents perform in situ verification of sensor nodes to verify source of anomalies. Moreover, mobile agent cannot be freely transmitted over the network, as transmission is several hundred times expensive operation as compare to processing. We optimize agent transmission through 2-sigma method. The formal behavior analysis of 2-sigma method is performed using Petri net theory to analyze its correctness. In future work, we aim to exploit cross-layer (XL) interaction to efficiently transmit mobile agent and perform quantitative analysis through experimental study. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.format.extent | 499778 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.publisher.place | United States | |
dc.publisher.uri | http://wowmom14.conference.nicta.com.au/ | |
dc.relation.ispartofstudentpublication | Y | |
dc.relation.ispartofconferencename | WoWMoM 2014 | |
dc.relation.ispartofconferencetitle | A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on | |
dc.relation.ispartofdatefrom | 2014-06-16 | |
dc.relation.ispartofdateto | 2014-06-19 | |
dc.relation.ispartoflocation | Sydney, Australia | |
dc.rights.retention | Y | |
dc.subject.fieldofresearch | Other information and computing sciences not elsewhere classified | |
dc.subject.fieldofresearchcode | 469999 | |
dc.title | Agent-enabled Anomaly Detection in Resource Constrained Wireless Sensor Networks | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.faculty | Griffith Sciences, Griffith School of Engineering | |
gro.rights.copyright | © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
gro.date.issued | 2015-03-13T04:19:13Z | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Usman, Muhammad | |