Journal ArticleDOI
The effective intrusion detection system using optimal feature selection algorithm
TLDR
The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources.Abstract:
Wireless mobile networks consist of autonomous with a limited battery life; there are many challenges in identifying false data. False data is generally detected and dropped by the sink, but the false data travelling in the network causes a lot of battery wastage. The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources. The proposed solution involves using advanced encryption standard (AES) by deploying keys to the mobile ad hoc nodes when the network is first deployed. The data is verified by usage of message authentication code. Location and the time stamp of the forwarding nodes is monitored to detect unusual activity by the forwarding nodes.read more
Citations
More filters
Journal ArticleDOI
A Novel Intrusion Detection System Based on Trust Evaluationto Defend Against DDoS Attack in MANET
M. Poongodi,S. Bose +1 more
TL;DR: A novel IDS is designed using the trust evaluation metrics used for the detection of the flooding DDOS attacks in the networked architecture that combines the existing Firecol-based security procedures with Dynamic Growing Self-Organizing Tree Algorithm in the Trust evaluation-based environment.
Journal ArticleDOI
Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem
M. Poongodi,S. Bose +1 more
TL;DR: The system uses the Aumann agreement theorem for convergence of Truth on opinion based on the bound of confidence value, such that truth consensus will maintained and the accuracy of system will be enhanced through this methodology.
Journal ArticleDOI
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET
M. Poongodi,S. Bose +1 more
TL;DR: A stochastic model of covariance matrix analysis in which the entropy difference has been computed by the frequency distribution of rule metrics against the threshold entropy periodically which in turn difference is highest can be controlled by reCAPTCHA controller to defend against DDoS attack.
Journal ArticleDOI
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
TL;DR: In this paper , a meta-heuristic algorithm for tuning the parameters of the neural network was employed for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm.
Journal ArticleDOI
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Arumugam K,Srimathi J,Sudhanshu Maurya,Senoj Joseph,Anju Asokan,Poongodi M,Abdullah A. Algethami,Mounir Hamdi,Hafiz Tayyab Rauf +8 more
TL;DR: In this article, a federated transfer learning for authentication and privacy preservation using Novel Supportive Twin Delayed DDPG (S-TD3) algorithm for Industrial Internet of Things (IIoT) has been proposed.
Related Papers (5)
Blockchain based En-Route Filtering of False Data in Wireless Sensor Networks
Alok Kumar,Alwyn R. Pais +1 more