Filters








60,889 Hits in 5.1 sec

Review Of Trust Models In Wireless Sensor Networks

V. Uma Rani, K. Soma Sundaram
2014 Zenodo  
To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network.  ...  The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable.  ...  A. Information Gathering Information gathering is a process in which, a node collects information about other nodes that is interested.  ... 
doi:10.5281/zenodo.1092174 fatcat:u5kvi6ozhzg6xivywxyasytawy

PLANGENT: an approach to making mobile agents intelligent

A. Ohsuga, Y. Nagai, Y. Irie, M. Hattori, S. Honiden
1997 IEEE Internet Computing  
However, gathering information and using services distributed in networks requires knowing exactly what kinds of information and services are required for a task, where they are, and how they can be obtained  ...  The Plangent system enables mobile agents to make a plan based on user input and adapt it according to information gathered from the network. .  ...  We also thank Yasuyuki Tahara, a researcher at the Laboratories, for his contributions to this research.  ... 
doi:10.1109/4236.612215 fatcat:n2upkhwworfmdi3ellaqetxs54

SOC based Self Healing Architecture for Data Security

S. LakshmiKantham, S. Ravi
2013 International Journal of Computer Applications  
Protecting enterprises from hackers, viruses and other security vulnerabilities is a primary concern for all IT System.  ...  In order to develop high security systems, many have relied on intrusion detection and prevention systems (IDPSs) as a solution.  ...  Local Data Collector The Local Database module is responsible for gathering routing information by applying the optimization algorithm between the nodes.  ... 
doi:10.5120/10757-5687 fatcat:fdby2f5vufccjglgzznybwjvhq

Intrusion-detection model integrating anomaly with misuse for space information network

Chundong She, Yaqi Ma, Luting Jia, Ligang Fei, Baohua Kou
2016 Journal of Communications and Information Networks  
Therefore, ensuring space information network safety is important. Intrusion-detection model as an important part of a network security system becomes a hot issue in space network security.  ...  Intrusion-detection model integrating anomaly with misuse for space information network[J].  ...  According to the anomaly detection of the transmission delay and flow, a system can detect a Journal of Communications and Information Networks 92 security warning for DDoS.  ... 
doi:10.1007/bf03391573 fatcat:im4kp6batzaxpkxk5vtbouduru

On data gathering and security in wireless sensor networks

Hidehisa Nakayama, Nirwan Ansari, Abbas Jamalipour, Yoshiaki Nemoto, Nei Kato
2007 2007 IEEE Sarnoff Symposium  
After a succinct summarization of each data gathering scheme, a comprehensive survey on security problems will be presented.  ...  Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges.  ...  Secure routing protocols depend on the network structure which can currently be categorized into two types, flat and hierarchy.  ... 
doi:10.1109/sarnof.2007.4567337 fatcat:eccgcvdt6va5jcpodqv2xuq7j4

Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable

Hossein Jadidoleslamy
2011 International Journal of Communications, Network and System Sciences  
Multi-hop Based on Clustering Architecture  Sensor nodes make a clustering structure [9,10];  Choosing a cluster-head for any cluster [8]; each cluster-head can communicate to the sink, directly; thus  ...  Protecting networks against different types of attacks is one of most important posed issue into the network and information security domains.  ...  and routing of routed events, agents' states, malicious events and processed events); besides routing, if necessary, it activates other agents (if they be inactivate). o Fault tolerant IDS: PIR is a process  ... 
doi:10.4236/ijcns.2011.48064 fatcat:jppobxp5wrfkzk23q5s2qdl2vm

Beaver algorithm for network security and optimization: Preliminary report

Aladdin Ayesh
2009 2009 IEEE International Conference on Systems, Man and Cybernetics  
The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization with the assumption that the beaver agent is deployed on a mobile device (e.g. smart  ...  This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers.  ...  In the process, it can gather information about routes and connections to establish a trust table including where to maintain it larder of information.  ... 
doi:10.1109/icsmc.2009.5346866 dblp:conf/smc/Ayesh09 fatcat:bh7lu574bzbqxocf2wa42ponfi

A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET

R. Arunkumar, A. Annalakshmi
2014 International Journal of Computer Applications  
based on their architecture and data gathering techniques.  ...  A Mobile Ad-hoc Network (MANET) is a mobile and multihop autonomous operation of wireless network.  ...  Acknowledgments I am indebted to my (PhD) guide Mrs.A.Annalakshmi for giving me an insight on intrusion detection systems.  ... 
doi:10.5120/14859-3230 fatcat:fngee26phfeo7dmxbnu24mouli

Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks

Bindiya Bhatia, M. K.Soni, Parul Tomar
2015 International Journal of Computer Network and Information Security  
Mobile agent provides solution to these challenges. A mobile agent is a new way of computer interactions and provides better options for the developers to create applications based on connectivity.  ...  Due to their mobility and autonomy these agents can perform various functions in mobile ad-hoc networks like topology discovery, routing, key management, congestion control etc.  ...  In this technique, routing information is gathered by mobile agents and the routing table of every node is revised according to the information collected.  ... 
doi:10.5815/ijcnis.2015.11.04 fatcat:y4tjqiodrjfmlbnkehc22lgvaq

An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing

N. Migas, W. Buchanan
2006 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)  
This novel method creates a network backbone for data routing and location management, which is composed of the fittest nodes.  ...  Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices.  ...  of gathered, redundant routing information. 4.  ... 
doi:10.1109/ecbs.2006.23 dblp:conf/ecbs/MigasB06 fatcat:x5wq5wv7g5gvrgclxvx47uznnq

Crisis management using MAS-based wireless sensor networks

Ahmad Sardouk, Majdi Mansouri, Leila Merghem-Boulahia, Dominique Gaiti, Rana Rahim-Amoud
2013 Computer Networks  
Our proposal uses a multi-agent system as a software layer.  ...  This approach is based on wireless sensor networks, which are distributed in nature with no need for infrastructure and could be deployed in dangerous and inaccessible zones to gather information.  ...  Considering the deficiencies in cellular networks and the placement problem when using hybrid proposals, information aggregation and continuous vital sign gathering, this paper proposes a multi-agent system-based  ... 
doi:10.1016/j.comnet.2012.08.010 fatcat:picodqupobeafdod2bbv7xlkqu

Dispatching Mobile Agents with Secure Routes in Parallel [chapter]

Yan Wang, Kian-Lee Tan
2001 Lecture Notes in Computer Science  
In this paper, we propose a parallel dispatch model with secure route structures for protecting the dispatch routes of agents.  ...  This model facilitates efficient dispatching of agents in a hierarchical manner, and ensures route security by exposing minimal route information to hosts.  ...  This work is partially supported by the research grant of Strategic Program on Computer Security from NSTB of Singapore.  ... 
doi:10.1007/3-540-45600-7_43 fatcat:nxtl7nfms5abfm56kbub44pyuu

A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks

Hossein Jadidoleslamy
2011 International journal of network security and its applications  
Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains.  ...  Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchical routing protocol  ...  Therefore, security is a vital and complex requirement for these networks.  ... 
doi:10.5121/ijnsa.2011.3511 fatcat:yvza52izhzhqtaxzbpmjck3rv4

Agents and ambient intelligence: case studies

Dante I. Tapia, Ajith Abraham, Juan M. Corchado, Ricardo S. Alonso
2009 Journal of Ambient Intelligence and Humanized Computing  
The agents have characteristics such as autonomy, reasoning, reactivity, social abilities and proactivity which make them appropriate for developing dynamic and distributed systems based on Ambient Intelligence  ...  Agents and Multi-Agent Systems are one of these technologies.  ...  Optimization of Surveillance Routes We have also developed a multi-agent system for managing and monitoring surveillance routes for security guards on industrial environments (Tapia, et al., 2009b) .  ... 
doi:10.1007/s12652-009-0006-2 fatcat:hs44cdohxra6hoyy7wsbp3uwbu

Comparative study of Distributed Intrusion Detection in Ad-hoc Networks

Sumitra Menaria, Sharada Valiveti, K Kotecha
2010 International Journal of Computer Applications  
We have also justified why distributed intrusion detection is better for ad hoc network with comparative study of existing intrusion detections in ad hoc network.  ...  General Terms Ad hoc networks, Security, IDS, DIDS.  ...  The following section outlines each module's work in detail. 1) Home agent: Home agent is present in each system and it gathers information about its system from application layer to routing layer. a)  ... 
doi:10.5120/1237-1699 fatcat:mvas4ymkencmlmiggl4mgwkjxi
« Previous Showing results 1 — 15 out of 60,889 results