A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime in this paper I am proposing to explore more extensive malicious attacks in addition to packet dropping and bad mouthing attacks, each and every with some different implications for energy, security and also reliability, and the investigate intrusion detection and multipath routing based tolerance protocols to react to these attacks. Intrusion detection is a security mechanism which is used to identify those who are trying to break and misuse the system without authorization and also those who have legitimate access but misusing their privileges.
Authors and Affiliations
Suman Jyothula
A Review: Hadoop Storage and Clustering Algorithms
Abstract : In the last few years there has been voluminous increase in the storing and processing of data, which require convincing speed and also requirement of storage space. Big data is a defined as large, diverseand...
Optimization of Horizontal Aggregation in SQL by using C4.5 Algorithm and K-Means Clustering
Abstract: Datasets in the horizontal aggregated layout are preferred by most of data mining algorithms, machine learning algorithm. Major efforts are required to compute data in the horizontal aggregated format. Th...
KURCS: Key Updating for Removing & replacement ofCompromised Sensor Nodes from Wireless Sensor Networks
Abstract : An energy efficient key management scheme is an important aspect to ensure secure services inresource constrained Wireless Sensor Networks (WSNs). There are two parts of key management scheme, i.e.key distribu...
Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC
Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be...
Soft Phone Support Voice and Video Calling Using Sip And Rtp Protocol
Soft Phone is a VoIP soft phone that uses the Session Initiation Protocol. It is a powerful and unique SIP software telephone that lets users make phone and video calls using single software application using any Voice o...