Title :
Agent-enabled anomaly detection in resource constrained wireless sensor networks
Author_Institution :
Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia
Abstract :
The state-of-the-art network anomaly detection systems are often unable to correctly verify source of anomalies; they have occurred in situ or in transit. To address this issue, this study proposes an agent-enabled anomaly detection system in which mobile agents perform in situ verification of sensor nodes to verify source of anomalies. Moreover, mobile agent cannot be freely transmitted over the network, as transmission is several hundred times expensive operation as compare to processing. We optimize agent transmission through 2-sigma method. The formal behavior analysis of 2-sigma method is performed using Petri net theory to analyze its correctness. In future work, we aim to exploit cross-layer (XL) interaction to efficiently transmit mobile agents.
Keywords :
mobile agents; telecommunication computing; telecommunication security; wireless sensor networks; 2-sigma method; Petri net theory; agent-enabled anomaly detection system; cross-layer interaction; formal behavior analysis; in situ verification; mobile agents; resource constrained wireless sensor networks; sensor nodes; Educational institutions; Mobile agents; Radio frequency; Resource management; Standards; Wireless communication; Wireless sensor networks;
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on a
Conference_Location :
Sydney, NSW
DOI :
10.1109/WoWMoM.2014.6918934