Use of Smart Intrusion Detection System for Enhancing the Security in Hierarchical Wireless Sensor Network
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 5
Abstract
Trusted environment provides safety measures for the sensor network. There are many problems that occur during the management of resources. Memory management and computation overhead or CPU usage are the major issues. Security issues is another problem in Wireless sensor network.. The three types of issues like issues of memory, computation overhead and intrusion detection is considered in this proposed research. The proposed model has provided a mechanism for resource management in a wireless sensor network. This model would also resolve one diff type of issue like computation overhead. The proposed work is capable to classify IDS attacks using a deep learning model. For improving accuracy a Network model is proposed during intrusion detection using a recurring neural network. The network model is used for testing by the help of a confusion matrix to calculate The accuracy, precision, recall and fscore. For clustered wireless sensor networks the advanced adaptive and dual data communication trust scheme (adct) have been used. Research is able to handle untrustworthy nodes inefficient manner. A function that is used in this research to assess direct trust among nodes is called Adaptive trust function. In intracluster as well as intercluster this Trust mechanism ADCT is used. With the help of compression mechanism Packets have been compressed for reducing the computation overhead. For security in Intrusion, this proposed model would also be capable. Moreover, research work would also deal with selfish nodes and malicious nodes to provide better of service for network lifetime for different network sizes.
Authors and Affiliations
Rahul Das, Dr. Mona Dwivedi
Anomaly Detection in Credit Card Transactions using Machine Learning
Anomaly Detection is a method of identifying the suspicious occurrence of events and data items that could create problems for the concerned authorities. Data anomalies are usually associated with issues such as security...
Investigation of Impact of Temperature on Proposed Device with Reference to DIEL CYCLE.
A Proposed device designed to protect the crops not only from the birds but also it is equipped with the multiple sensors to sense and repel the wild animals also from the cropland. It is also designed to sense any kind...
CMRepo End-to-End Automation
Performance Automation is a technique which helps in determining the performance of the system, by determining various system parameters under different workloads. This project aims at developing the framework for determ...
NATURE OF THE DIOPHANTINE EQUATION 4ˣ + 12ʸ = Z²
In this work, we discuss that the Diophantine equation as no non-negative integer solution where x, y and z are non-negative integers.
The Kinetic Equations of Addition Processes by the Free-Radical Nonbranched-Chain Mechanism
The aim of this study was the conclusion of simple kinetic equations to describe ab initio initiated nonbranchedchain processes of the saturated free-radical addition to the double bonds of unsaturated molecules in the b...