A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime in this paper I am proposing to explore more extensive malicious attacks in addition to packet dropping and bad mouthing attacks, each and every with some different implications for energy, security and also reliability, and the investigate intrusion detection and multipath routing based tolerance protocols to react to these attacks. Intrusion detection is a security mechanism which is used to identify those who are trying to break and misuse the system without authorization and also those who have legitimate access but misusing their privileges.
Authors and Affiliations
Suman Jyothula
The Design and Implementation of On-Line Examination UsingFirewall security
Abstract: Online Examination System is a software solution, which allows a company or institute to arrange,conduct and manage examinations via an online environment. This can be done through the Internet, Intraneta...
Design and Implementation of Binary Neural Network Classification Learning Algorithm
In this paper a Binary Neural Network Learning (BNN-CLA)[1] is analyzed and implemented for solving multi class problem normally the classifier are construct by combining the outputs of several binary ones. The B...
Segmentation of the Blood Vessel and Optic Disc in Retinal Images Using EM Algorithm
Abstract: Diabetic retinopathy (DR), glaucoma and hypertension are eye disease which is harmful and causes pressure in eye nerve and finally blindness. With the invention of new systems and the developing of newtechnolog...
Empirical Study of 2-bit Fast Adder using Simon 2.0
Abstract : The present context of post CMOS era demands highly sophisticated low power consuming high speed novel integrated chips in nanometer region. SET (Single Electron Transistor) is eventually the highest priority...
Mining Of Influential Users in a Blog Network
Abstract: Blogging sites are very popular in today’s world; users interact with each other and create socialrelationships between them. Data mining methods can be used to extract the blogging sites. Users can be ac...