This paper presents a model for ensuring data integrity using anomalous node identification in non-homogeneous wireless sensor networks (WSNs). We propose the anomaly detection technique while collecting data using mobile data collectors (MDCs), which detect the malicious activities before sending to the base station (BS). Our technique also protects the leader nodes (LNs) from malicious activities to ensure data integrity between the MDC and the LNs. The proposed approach learns the data characteristics from each sensor node and passes it to the MDC, where detection engine identifies the victim node and eventually alarm the LNs in order to keep the normal behaviour in the network. Our empirical evidence shows the effectiveness our approach
As wireless sensor networks are usually deployed in unattended areas, security policies cannot be up...
The primary function of wireless sensor networks is to gather sensor data from the monitored area. D...
Wireless sensor networks (WSNs) are vulnerable to attacks and faults which are often linked to abnor...
Wireless sensor networks (WSNs) are prone to vulnerabilities due to their resource constraints and d...
A compromised node in wireless sensor networks can be used to create false messages by generating th...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
Anomaly detection in a WSN is an important aspect of data analysis in order to identify data items t...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
Abstract — Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anoma...
Wireless Sensor Networks (WSNs) provide a low cost option for monitoring different environments such...
The emplacement of wireless sensor networks (WSNs) has increased dramatically in the last few years....
The paper reveals the essence and features of the proposed approach to detecting anomalies in a self...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
© 2013 Dr. Masud MoshtaghiWireless Sensor Networks (WSNs) provide a cost-effective platform for moni...
Abstract—Security threat and routing holes in wireless scenario are more frequent than other network...
As wireless sensor networks are usually deployed in unattended areas, security policies cannot be up...
The primary function of wireless sensor networks is to gather sensor data from the monitored area. D...
Wireless sensor networks (WSNs) are vulnerable to attacks and faults which are often linked to abnor...
Wireless sensor networks (WSNs) are prone to vulnerabilities due to their resource constraints and d...
A compromised node in wireless sensor networks can be used to create false messages by generating th...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
Anomaly detection in a WSN is an important aspect of data analysis in order to identify data items t...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
Abstract — Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anoma...
Wireless Sensor Networks (WSNs) provide a low cost option for monitoring different environments such...
The emplacement of wireless sensor networks (WSNs) has increased dramatically in the last few years....
The paper reveals the essence and features of the proposed approach to detecting anomalies in a self...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
© 2013 Dr. Masud MoshtaghiWireless Sensor Networks (WSNs) provide a cost-effective platform for moni...
Abstract—Security threat and routing holes in wireless scenario are more frequent than other network...
As wireless sensor networks are usually deployed in unattended areas, security policies cannot be up...
The primary function of wireless sensor networks is to gather sensor data from the monitored area. D...
Wireless sensor networks (WSNs) are vulnerable to attacks and faults which are often linked to abnor...