Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks
N. Chugh. International Journal of Computer Networks & Communications (IJCNC), 10 (6):
77-96(November 2018)
DOI: 10.5121/ijcnc.2018.10605
Abstract
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent
wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both
RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for
security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score.
%0 Journal Article
%1 chughavailability
%A Chugh, Neeraj
%D 2018
%E Natarajan, Meghanathan
%J International Journal of Computer Networks & Communications (IJCNC)
%K WSN
%N 6
%P 77-96
%R 10.5121/ijcnc.2018.10605
%T Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks
%U http://airccse.org/journal/ijc2018.html
%V 10
%X Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent
wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both
RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for
security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score.
@article{chughavailability,
abstract = {Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent
wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both
RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for
security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. },
added-at = {2019-01-07T06:45:04.000+0100},
author = {Chugh, Neeraj},
biburl = {https://www.bibsonomy.org/bibtex/27f8d24ccd4690209ebf8cd06bbabcfed/laimbee},
doi = {10.5121/ijcnc.2018.10605},
editor = {Natarajan, Meghanathan},
interhash = {689378c5d34b6e7e8cc2740b33ef6403},
intrahash = {7f8d24ccd4690209ebf8cd06bbabcfed},
issn = {09749322},
journal = {International Journal of Computer Networks & Communications (IJCNC) },
keywords = {WSN},
language = {English},
month = nov,
number = 6,
pages = {77-96},
timestamp = {2019-01-07T06:45:04.000+0100},
title = {Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks},
url = {http://airccse.org/journal/ijc2018.html},
volume = 10,
year = 2018
}