A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime in this paper I am proposing to explore more extensive malicious attacks in addition to packet dropping and bad mouthing attacks, each and every with some different implications for energy, security and also reliability, and the investigate intrusion detection and multipath routing based tolerance protocols to react to these attacks. Intrusion detection is a security mechanism which is used to identify those who are trying to break and misuse the system without authorization and also those who have legitimate access but misusing their privileges.
Authors and Affiliations
Suman Jyothula
Ranking optimization approach enhancement of line-up algorithm
Abstract: Ranking is a technique to categorize & finding the best option in the market. When number of best option is available in the market so its difficult to getting the best option is always a problem. In this p...
News Classification and Its Techniques: A Review
Abstract : Text mining has gained quite a significant importance during the past few years. Data, now-a-days is available to users through many sources like electronic media, digital media and many more. This data is usu...
A Survey on Secure Key Policy Attribute-Based Encryption Policy for Data Sharing Among Dynamic Groups in the Cloud
Profited from distributed computing, clients can accomplish a powerful and sparing methodology for information sharing among gathering individuals in the cloud with the characters of low support and little administration...
Efficient Detection of Internet Worms Using Data Mining Techniques
Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Methods with Memory Schemes in Simulink environment
When a signal travels from transmitter to receiver over multiple reflective paths then the phenomenon is called as multipath propagation. In a wireless mobile communication system, the multipath propagation ca...