Visual Scheme for the Detection of Mobile Attack on WSN Simulator

Recently, wireless sensor networks (WSNs) technologies have been utilized in diverse domains. Areas where WSNs are applied have been expanded from industries, schools, and research institutes to all fields of the human society. However, WSNs should be fixed or flexible depending on the areas of appl...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:International Journal of Distributed Sensor Networks
المؤلفون الرئيسيون: Young-Sik Jeong, Hyun-Woo Kim, Jong Hyuk Park
التنسيق: مقال
اللغة:الإنجليزية
منشور في: Wiley 2013-08-01
الوصول للمادة أونلاين:https://doi.org/10.1155/2013/502082
_version_ 1849636737549074432
author Young-Sik Jeong
Hyun-Woo Kim
Jong Hyuk Park
author_facet Young-Sik Jeong
Hyun-Woo Kim
Jong Hyuk Park
author_sort Young-Sik Jeong
collection DOAJ
container_title International Journal of Distributed Sensor Networks
description Recently, wireless sensor networks (WSNs) technologies have been utilized in diverse domains. Areas where WSNs are applied have been expanded from industries, schools, and research institutes to all fields of the human society. However, WSNs should be fixed or flexible depending on the areas of application and monitoring situations. Furthermore, measures for the security of data sensed when sensor nodes communicate with each other are not perfect, so sensors are sometimes easily attacked, and the security measures cover neither cases where sensors receive wrong information nor cases where attacks on external sensor nodes are sensed. Therefore, this paper provides the GML that can be mapped on actual topography so that optimum coverage can be inferred and can set target areas for two situations: mobile sensor networks (MSNs) and fixed sensor networks (FSNs). Sensors can be efficiently arranged through this sensor node information, and when the sensors have been arranged, security simulation functions applied with data encryption for data transmission between sensor nodes are provided. This paper also proposes an external detection trace simulator (EDTS) that would make sensing data transmitted between sensors visually provide information on the sensing of external attacks.
format Article
id doaj-art-da2dfcd770db4d4f9a3e03e867f93c1d
institution Directory of Open Access Journals
issn 1550-1477
language English
publishDate 2013-08-01
publisher Wiley
record_format Article
spelling doaj-art-da2dfcd770db4d4f9a3e03e867f93c1d2025-08-20T02:21:13ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-08-01910.1155/2013/502082Visual Scheme for the Detection of Mobile Attack on WSN SimulatorYoung-Sik Jeong0Hyun-Woo Kim1Jong Hyuk Park2 Department of Multimedia Engineering, Dongguk University, 30 Pildong-ro 1 Gil, Jung-Gu, Seoul 100-715, Republic of Korea Department of Multimedia Engineering, Dongguk University, 30 Pildong-ro 1 Gil, Jung-Gu, Seoul 100-715, Republic of Korea Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of KoreaRecently, wireless sensor networks (WSNs) technologies have been utilized in diverse domains. Areas where WSNs are applied have been expanded from industries, schools, and research institutes to all fields of the human society. However, WSNs should be fixed or flexible depending on the areas of application and monitoring situations. Furthermore, measures for the security of data sensed when sensor nodes communicate with each other are not perfect, so sensors are sometimes easily attacked, and the security measures cover neither cases where sensors receive wrong information nor cases where attacks on external sensor nodes are sensed. Therefore, this paper provides the GML that can be mapped on actual topography so that optimum coverage can be inferred and can set target areas for two situations: mobile sensor networks (MSNs) and fixed sensor networks (FSNs). Sensors can be efficiently arranged through this sensor node information, and when the sensors have been arranged, security simulation functions applied with data encryption for data transmission between sensor nodes are provided. This paper also proposes an external detection trace simulator (EDTS) that would make sensing data transmitted between sensors visually provide information on the sensing of external attacks.https://doi.org/10.1155/2013/502082
spellingShingle Young-Sik Jeong
Hyun-Woo Kim
Jong Hyuk Park
Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_full Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_fullStr Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_full_unstemmed Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_short Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_sort visual scheme for the detection of mobile attack on wsn simulator
url https://doi.org/10.1155/2013/502082
work_keys_str_mv AT youngsikjeong visualschemeforthedetectionofmobileattackonwsnsimulator
AT hyunwookim visualschemeforthedetectionofmobileattackonwsnsimulator
AT jonghyukpark visualschemeforthedetectionofmobileattackonwsnsimulator