Cross Layer Intrusion Detection System in WSNs using Self Rejuvenating Module
Journal Title: Engineering and Scientific International Journal - Year 2017, Vol 4, Issue 1
Abstract
The Wireless Sensor Networks (WSN) had been inferior to different attacks at different layers of the union stack. So that the rare intrusion detection systems (IDS) has been projected to act the WSNs. But routinely told these systems strengthen in a single portrays of the OSI model and do not act the interaction and co-develop between these layers. Hence these systems are the custom inefficient in WSN. The sustenance systems are handling the anomaly predicated intrusion detection which can be look to new and underdog attacks however routinely it fails to detect ultimately well-kenned security attacks for that reason an introduces the cross layer intrusion detection and obviation utilizing self-rejuvenating module is proposed which reprehensible of detecting and averting the network from attacker. The dominating goal about proposed function is to the single intrusion detection system that works on diverse layers of the OSI model and to detect the diverse types of attacks on various layers of the OSI model which is evaluated and demonstrated by using NS simulator.
Authors and Affiliations
Vidhya M
Morphometric analysis of the Catchments of Himayatsagar and Osmansagar Reservoirs - Hyderabad
The linking of the geomorphological parameters with the hydrological characteristics of the basin provides a simple way to understand the hydrologic behaviour of the different basins particularly of the ungauged basins b...
Biosynthesis and Characterization of Silver nanoparticles from the marine seaweedSargassumplagiophyllum
—Synthesis of Nanomaterials from biological source is a relatively new bloom in nanotechnology which is cheaper and has benefits over chemical and physical process of synthesis. The present work focussed on the synthesis...
SE-AODV-Secured and Energy Efficient Routing in Mobile Ad-hoc Network
Mobile ad hoc network (MANET) is a standalone network capable of autonomous operation where nodes communicate with each other without the need of any existing infrastructure. Mobile ad hoc networks consist of nodes that...
A Study on E-Smart Card System
Smart card provides detection, verification, data storage space and application processing. Smart cards are openly connected to the volume of information and applications that are automatically used on a card. A single s...
Automated Face Annotation using Machine Learning Techniques for Refinement of Weak Labelled Images
— Face annotation is the process of naming a person through his photo or person involved in video chat. Face annotation in images and videos enjoys many potential applications in multimedia information retrieval. Face an...