2014
DOI: 10.4304/jnw.9.12.3427-3444
|View full text |Cite
|
Sign up to set email alerts
|

A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks

Abstract: Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anomaly detection system should be able to identify the source of anomalies through in situ verification of suspicious behavior of sensor nodes. One approach for in situ verification is physical diagnosis of sensor nodes, which is a cumbersome and time-consuming task in medium-to-large-scale networks. Therefore, we propose a novel method for in situ verification of malicious sensor nodes using mobile agents. We employ Coordinat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Otherwise, the anomalous status of the node is reported to the corresponding 2 V type node. For further details of the in situ verification process, readers are referred to the previous studies [6], [7].…”
Section: ) Mobile Agentmentioning
confidence: 99%
See 2 more Smart Citations
“…Otherwise, the anomalous status of the node is reported to the corresponding 2 V type node. For further details of the in situ verification process, readers are referred to the previous studies [6], [7].…”
Section: ) Mobile Agentmentioning
confidence: 99%
“…The sensor nodes and their transmitted data are, however, susceptible to in situ and in transit anomalies. A software mobile agent-based anomaly detection scheme in such situations not only detects anomalies in a smart home sensor network, but also offers an automated service to verify the source of anomalies, before notifying a user about the anomalies [6], [7]. The in situ verification of a sensor node, which is believed to be a malicious node after receiving an anomalous observation, is carried out by the mobile agent by comparing the values of the received data with the stored values on the node.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Over the years, the research community has employed mobile agents for different purposes such as interbase station control communication and randomly sampling the data over the network in the anomaly detection applications for Wireless Sensor Networks (WSNs) [7]- [9]. Previous works investigated the role of the mobile agents in performing the task of the in situ verification of the nodes in order to identify the source of the anomalies [10], [11]. The previous studies, however, have not analyzed the temporal behavior of the mobile agent-enabled anomaly detection schemes, which is an important factor for their effective postdeployment functionality [7]- [11].…”
Section: Introductionmentioning
confidence: 99%
“…Previous works investigated the role of the mobile agents in performing the task of the in situ verification of the nodes in order to identify the source of the anomalies [10], [11]. The previous studies, however, have not analyzed the temporal behavior of the mobile agent-enabled anomaly detection schemes, which is an important factor for their effective postdeployment functionality [7]- [11].…”
Section: Introductionmentioning
confidence: 99%