Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several a

  • PDF / 4,083,788 Bytes
  • 154 Pages / 453.543 x 683.15 pts Page_size
  • 91 Downloads / 228 Views

DOWNLOAD

REPORT


Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks

Muhammad Usman Vallipuram Muthukkumarasamy Xin-Wen Wu Surraya Khanum •

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks

123

Muhammad Usman Department of Computer Sciences Quaid-I-Azam University Islamabad Pakistan Vallipuram Muthukkumarasamy School of Information and Communication Technology Griffith University Gold Coast, QLD Australia

Xin-Wen Wu School of Information and Communication Technology Griffith University Gold Coast, QLD Australia Surraya Khanum Department of Computer Sciences Quaid-I-Azam University Islamabad Pakistan

ISBN 978-981-10-7466-0 ISBN 978-981-10-7467-7 https://doi.org/10.1007/978-981-10-7467-7

(eBook)

Library of Congress Control Number: 2017962994 © Springer Nature Singapore Pte Ltd. 2018 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Dedicated to the research community…

Preface

The rapid technological developments in microelectronics and associated technologies have realized contemporary networking and computing paradigm, viz. shared sensor networks. This paradigm primarily relies on tiny sensor nodes, as key building blocks, to form a number of applications such as smart transport system, smart home, smart cities, smart irrigation system, and infrastructure and environment monitoring. The tiny sensor nodes, in the above-cited application domains, are vulnerable to in situ attacks, errors, and faults. On the similar account, the data sent by tiny nodes in the for