By Topic

Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Usman, M. ; Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia ; Muthukkumarasamy, V. ; Xin-Wen Wu ; Khanum, S.

Pervasive computing is changing the life style of human being in the 21st century. Smart home is one of the emerging examples for pervasive computing applications. In a smart home scenario, Wireless Sensor Network (WSN) can potentially provide information about device activities and their status. This information can be useful for variety of purposes like monitoring home security, examining status of nodes, and replacing nodes that are malfunctioning or dead. The sensor network needs to be protected from intrusions and anomalies. Over the years, various Intrusion Detection Systems (IDS) are proposed for preventing WSNs from intrusions. Although some mobile agent based IDS are proposed, anomaly detection for wireless smart home sensor network (WSHSN) is not fully exploited. In this article, we have proposed a mobile agent based anomaly detection mechanism for WSHSNs. The proposed scheme takes advantage from heterogeneous nature of devices in smart home for effectively detecting anomalies. The anomaly detection infrastructure is installed at resource rich nodes such as Cluster Heads (CHs).The mobile agent takes only few bytes of data to further assess the anomalous behavior of suspicious node. The analysis and comparative study show several advantages of the proposed scheme, such as efficient utilization of memory, reducing network load, and reduction in overall computational cost of the network. The nature of our proposed solution is generic, so that as it is, or with slight modifications, it can be implemented on other heterogeneous wireless sensor networks.

Published in:

Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on

Date of Conference:

4-7 Sept. 2012