A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Review Of Trust Models In Wireless Sensor Networks
2014
Zenodo
To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. ...
The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. ...
A. Information Gathering Information gathering is a process in which, a node collects information about other nodes that is interested. ...
doi:10.5281/zenodo.1092174
fatcat:u5kvi6ozhzg6xivywxyasytawy
PLANGENT: an approach to making mobile agents intelligent
1997
IEEE Internet Computing
However, gathering information and using services distributed in networks requires knowing exactly what kinds of information and services are required for a task, where they are, and how they can be obtained ...
The Plangent system enables mobile agents to make a plan based on user input and adapt it according to information gathered from the network. . ...
We also thank Yasuyuki Tahara, a researcher at the Laboratories, for his contributions to this research. ...
doi:10.1109/4236.612215
fatcat:n2upkhwworfmdi3ellaqetxs54
SOC based Self Healing Architecture for Data Security
2013
International Journal of Computer Applications
Protecting enterprises from hackers, viruses and other security vulnerabilities is a primary concern for all IT System. ...
In order to develop high security systems, many have relied on intrusion detection and prevention systems (IDPSs) as a solution. ...
Local Data Collector The Local Database module is responsible for gathering routing information by applying the optimization algorithm between the nodes. ...
doi:10.5120/10757-5687
fatcat:fdby2f5vufccjglgzznybwjvhq
Intrusion-detection model integrating anomaly with misuse for space information network
2016
Journal of Communications and Information Networks
Therefore, ensuring space information network safety is important. Intrusion-detection model as an important part of a network security system becomes a hot issue in space network security. ...
Intrusion-detection model integrating anomaly with misuse for space information network[J]. ...
According to the anomaly detection of the transmission delay and flow, a system can detect a Journal of Communications and Information Networks 92 security warning for DDoS. ...
doi:10.1007/bf03391573
fatcat:im4kp6batzaxpkxk5vtbouduru
On data gathering and security in wireless sensor networks
2007
2007 IEEE Sarnoff Symposium
After a succinct summarization of each data gathering scheme, a comprehensive survey on security problems will be presented. ...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. ...
Secure routing protocols depend on the network structure which can currently be categorized into two types, flat and hierarchy. ...
doi:10.1109/sarnof.2007.4567337
fatcat:eccgcvdt6va5jcpodqv2xuq7j4
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
2011
International Journal of Communications, Network and System Sciences
Multi-hop Based on Clustering Architecture Sensor nodes make a clustering structure [9,10]; Choosing a cluster-head for any cluster [8]; each cluster-head can communicate to the sink, directly; thus ...
Protecting networks against different types of attacks is one of most important posed issue into the network and information security domains. ...
and routing of routed events, agents' states, malicious events and processed events); besides routing, if necessary, it activates other agents (if they be inactivate). o Fault tolerant IDS: PIR is a process ...
doi:10.4236/ijcns.2011.48064
fatcat:jppobxp5wrfkzk23q5s2qdl2vm
Beaver algorithm for network security and optimization: Preliminary report
2009
2009 IEEE International Conference on Systems, Man and Cybernetics
The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization with the assumption that the beaver agent is deployed on a mobile device (e.g. smart ...
This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. ...
In the process, it can gather information about routes and connections to establish a trust table including where to maintain it larder of information. ...
doi:10.1109/icsmc.2009.5346866
dblp:conf/smc/Ayesh09
fatcat:bh7lu574bzbqxocf2wa42ponfi
A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET
2014
International Journal of Computer Applications
based on their architecture and data gathering techniques. ...
A Mobile Ad-hoc Network (MANET) is a mobile and multihop autonomous operation of wireless network. ...
Acknowledgments I am indebted to my (PhD) guide Mrs.A.Annalakshmi for giving me an insight on intrusion detection systems. ...
doi:10.5120/14859-3230
fatcat:fngee26phfeo7dmxbnu24mouli
Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
2015
International Journal of Computer Network and Information Security
Mobile agent provides solution to these challenges. A mobile agent is a new way of computer interactions and provides better options for the developers to create applications based on connectivity. ...
Due to their mobility and autonomy these agents can perform various functions in mobile ad-hoc networks like topology discovery, routing, key management, congestion control etc. ...
In this technique, routing information is gathered by mobile agents and the routing table of every node is revised according to the information collected. ...
doi:10.5815/ijcnis.2015.11.04
fatcat:y4tjqiodrjfmlbnkehc22lgvaq
An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing
2006
13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)
This novel method creates a network backbone for data routing and location management, which is composed of the fittest nodes. ...
Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. ...
of gathered, redundant routing information.
4. ...
doi:10.1109/ecbs.2006.23
dblp:conf/ecbs/MigasB06
fatcat:x5wq5wv7g5gvrgclxvx47uznnq
Crisis management using MAS-based wireless sensor networks
2013
Computer Networks
Our proposal uses a multi-agent system as a software layer. ...
This approach is based on wireless sensor networks, which are distributed in nature with no need for infrastructure and could be deployed in dangerous and inaccessible zones to gather information. ...
Considering the deficiencies in cellular networks and the placement problem when using hybrid proposals, information aggregation and continuous vital sign gathering, this paper proposes a multi-agent system-based ...
doi:10.1016/j.comnet.2012.08.010
fatcat:picodqupobeafdod2bbv7xlkqu
Dispatching Mobile Agents with Secure Routes in Parallel
[chapter]
2001
Lecture Notes in Computer Science
In this paper, we propose a parallel dispatch model with secure route structures for protecting the dispatch routes of agents. ...
This model facilitates efficient dispatching of agents in a hierarchical manner, and ensures route security by exposing minimal route information to hosts. ...
This work is partially supported by the research grant of Strategic Program on Computer Security from NSTB of Singapore. ...
doi:10.1007/3-540-45600-7_43
fatcat:nxtl7nfms5abfm56kbub44pyuu
A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks
2011
International journal of network security and its applications
Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains. ...
Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchical routing protocol ...
Therefore, security is a vital and complex requirement for these networks. ...
doi:10.5121/ijnsa.2011.3511
fatcat:yvza52izhzhqtaxzbpmjck3rv4
Agents and ambient intelligence: case studies
2009
Journal of Ambient Intelligence and Humanized Computing
The agents have characteristics such as autonomy, reasoning, reactivity, social abilities and proactivity which make them appropriate for developing dynamic and distributed systems based on Ambient Intelligence ...
Agents and Multi-Agent Systems are one of these technologies. ...
Optimization of Surveillance Routes We have also developed a multi-agent system for managing and monitoring surveillance routes for security guards on industrial environments (Tapia, et al., 2009b) . ...
doi:10.1007/s12652-009-0006-2
fatcat:hs44cdohxra6hoyy7wsbp3uwbu
Comparative study of Distributed Intrusion Detection in Ad-hoc Networks
2010
International Journal of Computer Applications
We have also justified why distributed intrusion detection is better for ad hoc network with comparative study of existing intrusion detections in ad hoc network. ...
General Terms Ad hoc networks, Security, IDS, DIDS. ...
The following section outlines each module's work in detail. 1) Home agent: Home agent is present in each system and it gathers information about its system from application layer to routing layer. a) ...
doi:10.5120/1237-1699
fatcat:mvas4ymkencmlmiggl4mgwkjxi
« Previous
Showing results 1 — 15 out of 60,889 results