Telecommunications network design algorithms
Telecommunications network design algorithms
IEEE Transactions on Software Engineering
Seven good reasons for mobile agents
Communications of the ACM
IEEE 802.15.4 Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensor Networks
IEEE 802.15.4 Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensor Networks
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Journal of Parallel and Distributed Computing
Adaptive Power Management for Mobile Agent-Based Information Retrieval
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Programming sensor networks with mobile agents
Proceedings of the 6th international conference on Mobile data management
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Data Dissemination based on Mobile Agent in Wireless Sensor Networks
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
On Computing Mobile Agent Routes for Data Fusion in Distributed Sensor Networks
IEEE Transactions on Knowledge and Data Engineering
A new reverse auction agent system for m-commerce using mobile agents
Computer Standards & Interfaces
Designing secure sensor networks
IEEE Wireless Communications
Multiresolution data integration using mobile agents in distributedsensor networks
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Mobile software agents: an overview
IEEE Communications Magazine
IEEE Communications Magazine
Hi-index | 0.00 |
Mobile Agent (MA) technology has been recently proposed in Wireless Sensor Networks (WSNs) literature to answer the scalability problem of client/server model in data fusion applications. In this paper, we describe the critical role MAs can play in the field of security and robustness of a WSN in addition to data fusion. The design objective of our Jamming Avoidance Itinerary Design (JAID) algorithm is twofold: (a) to calculate near-optimal routes for MAs that incrementally fuse the data as they visit the nodes; (b) in the face of jamming attacks against the WSN, to modify the itineraries of the MAs to bypass the jammed area(s) while not disrupting the efficient data dissemination from working sensors. If the number of jammed nodes is small, JAID only modifies the pre-jamming scheduled itineraries to increase the algorithm's promptness. Otherwise, JAID re-constructs the agent itineraries excluding the jammed area(s). Another important feature of JAID is the suppression of data taken from sensors when the associated successive readings do not vary significantly. Data suppression also occurs when sensors' readings are identical to those of their neighboring sensors. Simulation results confirm that JAID enables retrieval of information from the working sensors of partially jammed WSNs and verifies its performance gain over alternative approaches in data fusion tasks.