scispace - formally typeset
Journal ArticleDOI

The effective intrusion detection system using optimal feature selection algorithm

TLDR
The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources.
Abstract
Wireless mobile networks consist of autonomous with a limited battery life; there are many challenges in identifying false data. False data is generally detected and dropped by the sink, but the false data travelling in the network causes a lot of battery wastage. The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources. The proposed solution involves using advanced encryption standard (AES) by deploying keys to the mobile ad hoc nodes when the network is first deployed. The data is verified by usage of message authentication code. Location and the time stamp of the forwarding nodes is monitored to detect unusual activity by the forwarding nodes.

read more

Citations
More filters
Journal ArticleDOI

A Novel Intrusion Detection System Based on Trust Evaluationto Defend Against DDoS Attack in MANET

TL;DR: A novel IDS is designed using the trust evaluation metrics used for the detection of the flooding DDOS attacks in the networked architecture that combines the existing Firecol-based security procedures with Dynamic Growing Self-Organizing Tree Algorithm in the Trust evaluation-based environment.
Journal ArticleDOI

Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem

TL;DR: The system uses the Aumann agreement theorem for convergence of Truth on opinion based on the bound of confidence value, such that truth consensus will maintained and the accuracy of system will be enhanced through this methodology.
Journal ArticleDOI

Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET

TL;DR: A stochastic model of covariance matrix analysis in which the entropy difference has been computed by the frequency distribution of rule metrics against the threshold entropy periodically which in turn difference is highest can be controlled by reCAPTCHA controller to defend against DDoS attack.
Journal ArticleDOI

Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images

TL;DR: In this paper , a meta-heuristic algorithm for tuning the parameters of the neural network was employed for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm.
Journal ArticleDOI

Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT

TL;DR: In this article, a federated transfer learning for authentication and privacy preservation using Novel Supportive Twin Delayed DDPG (S-TD3) algorithm for Industrial Internet of Things (IIoT) has been proposed.
Related Papers (5)