Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Securing mobile agent based Wireless Sensor Network applications on middleware

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Usman, M. ; Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia ; Muthukkumarasamy, V. ; Xin-Wen Wu ; Khanum, S.

Wireless Sensor Network (WSN) is an indispensable component of pervasive computing. Mobile agents are used for several applications in WSNs such as data fusion, localization, re-allocate, and update of tasks on sensor nodes, etc. Middleware can provide a platform to these different applications to work concurrently and independently on top of sensor node's operating system. WSN often suffer from low availability of resources. Thus they cannot afford to implement effective security mechanisms at application or hardware layer. In this article, we propose a middleware architecture for mobile agent based WSN applications that is not only efficient for traditional tasks, but also capable of providing adequate security services. As a case study, we explore mobile agent based intrusion detection system, considering as an application, for our proposed middleware architecture. Comparative study and detailed analysis of proposed middleware architecture show a number of benefits.

Published in:

Communications and Information Technologies (ISCIT), 2012 International Symposium on

Date of Conference:

2-5 Oct. 2012