Visual Scheme for the Detection of Mobile Attack on WSN Simulator

Recently, wireless sensor networks (WSNs) technologies have been utilized in diverse domains. Areas where WSNs are applied have been expanded from industries, schools, and research institutes to all fields of the human society. However, WSNs should be fixed or flexible depending on the areas of appl...

Full description

Saved in:
Bibliographic Details
Main Authors: Young-Sik Jeong, Hyun-Woo Kim, Jong Hyuk Park
Format: Article
Language:English
Published: Wiley 2013-08-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/502082
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850167318610444288
author Young-Sik Jeong
Hyun-Woo Kim
Jong Hyuk Park
author_facet Young-Sik Jeong
Hyun-Woo Kim
Jong Hyuk Park
author_sort Young-Sik Jeong
collection DOAJ
description Recently, wireless sensor networks (WSNs) technologies have been utilized in diverse domains. Areas where WSNs are applied have been expanded from industries, schools, and research institutes to all fields of the human society. However, WSNs should be fixed or flexible depending on the areas of application and monitoring situations. Furthermore, measures for the security of data sensed when sensor nodes communicate with each other are not perfect, so sensors are sometimes easily attacked, and the security measures cover neither cases where sensors receive wrong information nor cases where attacks on external sensor nodes are sensed. Therefore, this paper provides the GML that can be mapped on actual topography so that optimum coverage can be inferred and can set target areas for two situations: mobile sensor networks (MSNs) and fixed sensor networks (FSNs). Sensors can be efficiently arranged through this sensor node information, and when the sensors have been arranged, security simulation functions applied with data encryption for data transmission between sensor nodes are provided. This paper also proposes an external detection trace simulator (EDTS) that would make sensing data transmitted between sensors visually provide information on the sensing of external attacks.
format Article
id doaj-art-da2dfcd770db4d4f9a3e03e867f93c1d
institution OA Journals
issn 1550-1477
language English
publishDate 2013-08-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-da2dfcd770db4d4f9a3e03e867f93c1d2025-08-20T02:21:13ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-08-01910.1155/2013/502082Visual Scheme for the Detection of Mobile Attack on WSN SimulatorYoung-Sik Jeong0Hyun-Woo Kim1Jong Hyuk Park2 Department of Multimedia Engineering, Dongguk University, 30 Pildong-ro 1 Gil, Jung-Gu, Seoul 100-715, Republic of Korea Department of Multimedia Engineering, Dongguk University, 30 Pildong-ro 1 Gil, Jung-Gu, Seoul 100-715, Republic of Korea Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of KoreaRecently, wireless sensor networks (WSNs) technologies have been utilized in diverse domains. Areas where WSNs are applied have been expanded from industries, schools, and research institutes to all fields of the human society. However, WSNs should be fixed or flexible depending on the areas of application and monitoring situations. Furthermore, measures for the security of data sensed when sensor nodes communicate with each other are not perfect, so sensors are sometimes easily attacked, and the security measures cover neither cases where sensors receive wrong information nor cases where attacks on external sensor nodes are sensed. Therefore, this paper provides the GML that can be mapped on actual topography so that optimum coverage can be inferred and can set target areas for two situations: mobile sensor networks (MSNs) and fixed sensor networks (FSNs). Sensors can be efficiently arranged through this sensor node information, and when the sensors have been arranged, security simulation functions applied with data encryption for data transmission between sensor nodes are provided. This paper also proposes an external detection trace simulator (EDTS) that would make sensing data transmitted between sensors visually provide information on the sensing of external attacks.https://doi.org/10.1155/2013/502082
spellingShingle Young-Sik Jeong
Hyun-Woo Kim
Jong Hyuk Park
Visual Scheme for the Detection of Mobile Attack on WSN Simulator
International Journal of Distributed Sensor Networks
title Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_full Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_fullStr Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_full_unstemmed Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_short Visual Scheme for the Detection of Mobile Attack on WSN Simulator
title_sort visual scheme for the detection of mobile attack on wsn simulator
url https://doi.org/10.1155/2013/502082
work_keys_str_mv AT youngsikjeong visualschemeforthedetectionofmobileattackonwsnsimulator
AT hyunwookim visualschemeforthedetectionofmobileattackonwsnsimulator
AT jonghyukpark visualschemeforthedetectionofmobileattackonwsnsimulator