skip to main content
10.1145/2818567.2818687acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccctConference Proceedingsconference-collections
research-article

Wireless Forensic Ready Multiple Sink Wireless Sensor Network

Published: 25 September 2015 Publication History

Abstract

A sensor network deployed at international borders requires extreme level of security. The sensor network is supposed to be forensic ready so that at the time of crime and after the crime proper proofs can be displayed before the court of law. The current research work deals with an intelligent multi agent system deployed at multiple sinks in a wireless sensor network. The sensed data is made forensic ready so that it can presented before the court of law.

References

[1]
Durisic, M. P.; Tafa, Z.; Dimic, G.; Milutinovic, V., "A survey of military applications of wireless sensor networks," 2012 Mediterranean Conference on Embedded Computing (MECO), pp.196,199, 19-21 June 2012
[2]
K. Shanmugavalli, K. Fathima, Wireless Sensor Network Based Surveillance System to Track Enemy Intrusion at Borders, International Journal of Engineering Science and Innovative Technology (IJESIT),Volume 3, Issue 1, January 2014
[3]
J Tan, Forensic Readiness, 2001.
[4]
Mouton, F.; Venter, H. S., "A prototype for achieving digital forensic readiness on wireless sensor networks," AFRICON, 2011, vol., no., pp.1,6, 13-15 Sept. 2011 10.1109/AFRCON.2011.6072117
[5]
Tapan Kumar Jain et al, Lifetime Optimization of a Multiple Sink Wireless Sensor Network through Energy Balancing, Journal of Sensors, vol 2015. http://dx.doi.org/10.1155/2015/921250
[6]
Athira V Panicker, Jisha G,Network Layer Attacks and Protection in MANET-A Survey, International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 3437--3443
[7]
PO-WAH YAU, SHENGLAN HU and CHRIS J. MITCHELL, Malicious attacks on ad hoc network routing protocols
[8]
Mahendra Kumar et al, A Study of wireless Ad-Hoc Network attack and Routing Protocol attack, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012
[9]
Michael Winkler, Klaus-Dieter Tuchs, Kester Hughes, and Graeme Barclay, Theoretical and practical aspects of military wireless sensor networks, Journal of Telecommunications and Information Technology, vol 2/2008
[10]
Sang Hyuk Lee; Soobin Lee; Heecheol Song; Hwang Soo Lee, "Wireless sensor network design for tactical military applications: Remote large-scale environments," Military Communications Conference, 2009. MILCOM 2009. IEEE, vol., no., pp.1,7, 18-21 Oct. 2009
[11]
F Mouton and H S Venter, "Requirements for Wireless Sensor Networks in order to achieve Digital Forensic Readiness," in 6th International Annual Workshop on Digital Forensics & Incident Analysis, London, 2011.
[12]
Robert Rowlingson, A Ten Step Process for Forensic Readiness, International Journal of Digital Evidence, 2004, Volume 2, Issue 3, pp 1--28
[13]
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, Common Phases of Computer Forensics Investigation Models, International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011
[14]
Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury, " A survey on wireless multimedia sensor networks," Proceedings of Elsevier October 2006.
[15]
Djordje Mitrovic, Video Compression, -- University of Edinburgh, http://homepages.inf.ed.ac.uk/rbf/CVonline/LOCAL_COPIES/AV0506/s0561282.pdf, accessed on 12th March 2015
[16]
T. Fryza, Compression of Video Signals by 3D-DCT Transform. Diploma thesis, Institute of Radio Electronics, FEKT Brno University of Technology, Czech Republic, 2002.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCCT '15: Proceedings of the Sixth International Conference on Computer and Communication Technology 2015
September 2015
481 pages
ISBN:9781450335522
DOI:10.1145/2818567
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 September 2015

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCCT '15

Acceptance Rates

Overall Acceptance Rate 33 of 124 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 80
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media