Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

The effective intrusion detection system using optimal feature selection algorithm

The effective intrusion detection system using optimal feature selection algorithm Wireless mobile networks consist of autonomous with a limited battery life; there are many challenges in identifying false data. False data is generally detected and dropped by the sink, but the false data travelling in the network causes a lot of battery wastage. The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources. The proposed solution involves using advanced encryption standard (AES) by deploying keys to the mobile ad hoc nodes when the network is first deployed. The data is verified by usage of message authentication code. Location and the time stamp of the forwarding nodes is monitored to detect unusual activity by the forwarding nodes. Keywords: gang injection; advanced encryption standard; AES; cooperative authentication; location mitigation. Reference to this paper should be made as follows: Poongodi, M., Bose, S. and Ganeshkumar, N. (2015) ` using optimal feature selection algorithm', Int. J. Enterprise Network Management, Vol. 6, No. 4, pp.263­274. Biographical notes: M. Poongodi received her BTech in Information Technology from Anna University, Tamil Nadu, India in the year 2009 and the ME Master's degree in Computer Science and Engineering from St. Peter's http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Enterprise Network Management Inderscience Publishers

The effective intrusion detection system using optimal feature selection algorithm

Loading next page...
 
/lp/inderscience-publishers/the-effective-intrusion-detection-system-using-optimal-feature-Px4Id5RD5P

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Inderscience Publishers
Copyright
Copyright © 2015 Inderscience Enterprises Ltd.
ISSN
1748-1252
eISSN
1748-1260
DOI
10.1504/IJENM.2015.073869
Publisher site
See Article on Publisher Site

Abstract

Wireless mobile networks consist of autonomous with a limited battery life; there are many challenges in identifying false data. False data is generally detected and dropped by the sink, but the false data travelling in the network causes a lot of battery wastage. The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources. The proposed solution involves using advanced encryption standard (AES) by deploying keys to the mobile ad hoc nodes when the network is first deployed. The data is verified by usage of message authentication code. Location and the time stamp of the forwarding nodes is monitored to detect unusual activity by the forwarding nodes. Keywords: gang injection; advanced encryption standard; AES; cooperative authentication; location mitigation. Reference to this paper should be made as follows: Poongodi, M., Bose, S. and Ganeshkumar, N. (2015) ` using optimal feature selection algorithm', Int. J. Enterprise Network Management, Vol. 6, No. 4, pp.263­274. Biographical notes: M. Poongodi received her BTech in Information Technology from Anna University, Tamil Nadu, India in the year 2009 and the ME Master's degree in Computer Science and Engineering from St. Peter's

Journal

International Journal of Enterprise Network ManagementInderscience Publishers

Published: Jan 1, 2015

There are no references for this article.