Compositional Optimum Network Sensor Utilization System
نویسندگان
چکیده
Currently employed intrusion detection sensor configurations rarely change. This represents a broad, static attack detection domain. Changes within a dynamic environment, due either to policy changes, or changes within the system’s condition, can make certain attacks more important than others. Static scopes will either result in flooding administrators with relatively less important attack reports, or result in the elusion of more important attacks. We present a model which can dynamically incorporate changes within policy and the environment, resulting in autonomic sensor reconfigurations that more accurately detects and reports important attacks within the system.
منابع مشابه
Efficient Use of Wireless Sensors for Data Collection in Precision Agriculture
This paper looks at how to optimize data collection from the wireless sensor nodes and analysis of this data for an efficient irrigation scheduling in order to optimize water usage. In this research we design a model system which integrates optimum node placement and data aggregation to see the combined effect on the efficiency of the wireless sensor network (WSN) that is in terms of latency, p...
متن کاملPerformance analysis and classification of Clone attack detection procedures in mobile wireless sensor networks, pdfkeywords=wireless sensor network (WSN), clone attack, intrusion detection, mobility
Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملPerformance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks
Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended...
متن کاملAn Energy Efficient Hybrid routing for Wireless Sensor Network using Fuzzy Logic
Wireless Sensor Networks is a collection of sensor nodes and base station. The nodes have limited battery power. The efficient utilization of sensor node’s energy, clustering is one of the powerful tool. The heterogeneous wireless sensor networks consist of different type of sensor nodes in term of sensing, computation, communication and power. The proposed protocol is An Energy Efficient Hybri...
متن کامل