Cross Layer Intrusion Detection System in WSNs using Self Rejuvenating Module
Journal Title: Engineering and Scientific International Journal - Year 2017, Vol 4, Issue 1
Abstract
The Wireless Sensor Networks (WSN) had been inferior to different attacks at different layers of the union stack. So that the rare intrusion detection systems (IDS) has been projected to act the WSNs. But routinely told these systems strengthen in a single portrays of the OSI model and do not act the interaction and co-develop between these layers. Hence these systems are the custom inefficient in WSN. The sustenance systems are handling the anomaly predicated intrusion detection which can be look to new and underdog attacks however routinely it fails to detect ultimately well-kenned security attacks for that reason an introduces the cross layer intrusion detection and obviation utilizing self-rejuvenating module is proposed which reprehensible of detecting and averting the network from attacker. The dominating goal about proposed function is to the single intrusion detection system that works on diverse layers of the OSI model and to detect the diverse types of attacks on various layers of the OSI model which is evaluated and demonstrated by using NS simulator.
Authors and Affiliations
Vidhya M
Mobile-to-Mobile Communication using Secured Shared Key
In mobile networking, Mobile-to-Mobile communication helps in data exchange between actual and closest devices. The Mobile-to-Mobile communications are used to make short range communication. It improves the network perf...
Impact on Thermal Properties of Burnt Clay Bricks using Foundry Sand
Industrial waste such as foundry sand and many others are posing problems to manufacturing industries as strict environmental policies are not allowing open dumping or stacking of these waste materials. To solve the prob...
Internet of Things a Vision of Future and the Technological Growth
This paper addresses the impact of Internet of Things (IoT) in the whole world. The effort of IOT is to provide a communication between the network, common devices or human to other devices through the internet. Ten year...
Randomized Image Password and a QR Code Based Circumnavigation Mechanism for Secure Authentication using caRP
Password is the security primitives used for proving a user identity in online. Many graphical password techniques have been proposed which is used to improve password usability and security. In this paper, we present a...
Improving Iris Performance using Segmentation with CASIA Database
We can recognize humans each other according to their numerous characteristics of age. Identity verification (authentication) in computer systems has been traditionally based on something like password, key, card, pin an...