PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 2
Abstract
Wireless ad-hoc networks are vulnerable to various kinds of security threats and attacks due to relative ease of access to wireless medium and lack of a centralized infrastructure. Security is an alarming concern, as everything being transmitted is available in the air. The current paper deals with Study of effect of rate on performance of cross layer based intrusion detection for WLAN reflects the significance of cross layer technique in detecting intruder on WLAN. Exploiting the information available across different layers of the protocol stack by triggering multiple levels of detection enhances the accuracy of detection. We validate our design through simulations and also demonstrate lower occurrence of false positives.
Authors and Affiliations
Dr. Vinod Kumar, Mr Avtar Singh, Mrs. Ritika Narang
PSO-based Optimal PID Controller for Twin Rotor MIMO System
Optimum design methods based on soft computing have proved their excellence in industrial automatic control systems. In this paper, a proposed system is presented to treat the tuning of proportional, integral and derivat...
Improvement inEnergy Efficiency of Wireless Sensor Network
Clustering in wireless sensor network is important to increase the lifetime of sensor network. LEACH protocol is one of the clustering routing protocols in wireless sensor networks. In LEACH each node has the equal proba...
A Case Study on Risk Management Practice in Outsourced Software Migration Projects
While there are many studies conducted on software risk during the last two decades, very few have been published on software risk management practice in IT industry. In this paper we explore industry practice in the man...
Using mobile communication as a tool for national growth and development
Mobile communication emergence has brought a whole palette of new possibilities in information sharing not only for individual development but also for national growth. New mobile information devices such as Personal Dig...
A Survey on Design Methods for Secure Software Development
Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many sec...