Mobile Agent Based Enhanced Security for Wireless Sensor Networks

Mobile Agent Based Enhanced Security for Wireless Sensor Networks

D. Sheela, G. Mahadevan
Copyright: © 2014 |Volume: 10 |Issue: 2 |Pages: 15
ISSN: 1548-0631|EISSN: 1548-064X|EISBN13: 9781466652927|DOI: 10.4018/ijbdcn.2014040102
Cite Article Cite Article

MLA

Sheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." IJBDCN vol.10, no.2 2014: pp.15-29. http://doi.org/10.4018/ijbdcn.2014040102

APA

Sheela, D. & Mahadevan, G. (2014). Mobile Agent Based Enhanced Security for Wireless Sensor Networks. International Journal of Business Data Communications and Networking (IJBDCN), 10(2), 15-29. http://doi.org/10.4018/ijbdcn.2014040102

Chicago

Sheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks," International Journal of Business Data Communications and Networking (IJBDCN) 10, no.2: 15-29. http://doi.org/10.4018/ijbdcn.2014040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Thus, design and implementation of secure WSNs is challenging task. Recently mobile agents have been proved as an enabled technology for programming WSN. This research work fundamentally focuses on producing a combined security solution which uses mobile agents. The proposed security solution using mobile agents is to provide basic security services and to defend against seven attacks such as Denial of Service attack, Hello flooding attack, Traffic analysis, Cloning attack, Sink hole attack, Black hole attack and Selective forwarding attack with the energy overhead of addressing a single attack.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.