-
Policy based intrusion detection and response system in hierarchical WSN architecture
Abstract: In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose… ▽ More
Submitted 7 September, 2012; originally announced September 2012.
Comments: 5 pages, IEEE International Conference on Wireless Communication,Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Wireless Vitae'09, May 17-20, 2009. Aalborg, Denmark. ISBN 978-1-4244-4067-2
-
Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information
Abstract: A lot of sensor network applications are data-driven. We believe that query is the most preferred way to discover sensor services. Normally users are unaware of available sensors. Thus users need to pose different types of query over the sensor network to get the desired information. Even users may need to input more complicated queries with higher levels of aggregations, and requires more complex… ▽ More
Submitted 18 August, 2012; originally announced August 2012.
Comments: 15 pages, International Journal of Computer Applications (IJCA) (0975 - 8887) Volume 15- No.1, February 2011
Journal ref: International Journal of Computer Applications 15(1):11-25, February 2011. Published by Foundation of Computer Science
-
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
Abstract: In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion preven… ▽ More
Submitted 18 August, 2012; originally announced August 2012.
Comments: 16 pages, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap with arXiv:1111.1933 by other authors
-
WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure
Abstract: This paper presents a description of the existing wireless technology Wi-Fi and WiMAX, and try to compare Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16), with respect to which technology provides a better solution to build a wireless access infrastructure. Each technology is evaluated based on some key characteristics. This paper concludes with a statement of, which technology will be the best and mo… ▽ More
Submitted 18 August, 2012; originally announced August 2012.
Comments: 6 pages,2 figures, Conference: ICLAN'2007, IEEE France
ACM Class: C.2.1
-
Nonlinear System Identification and Behavioral Modeling
Abstract: This paper has been withdrawn by the author
Submitted 19 April, 2010; v1 submitted 25 February, 2010; originally announced February 2010.
Comments: This paper has been withdrawn by the author
Journal ref: K. M. S. Huq, M. T. Arefin and A. F. M. S. Kabir, "Nonlinear System Identification and Behavioral Modeling", Journal of Telecommunications, Volume 1, Issue 1, pp94-98, February 2010
-
Interconnection between 802.15.4 Devices and IPv6: Implications and Existing Approaches
Abstract: The increasing role of home automation in routine life and the rising demand for sensor networks enhanced wireless personal area networks (WPANs) development, pervasiveness of wireless & wired network, and research. Soon arose the need of implementing the Internet Protocol in these devices in order to WPAN standards, raising the way for questions on how to provide seamless communication between… ▽ More
Submitted 5 February, 2010; originally announced February 2010.
Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php
Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php