Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A Cluster Based Intrusion Detection Techniques for Wireless Sensor Networks.
Author(s):
1. A Sunitha Nandhini: Sri Krishna College of Technology, Coimbatore, Tamil nadu, India
2. T Rajesh kumar: Sri Krishna College of Technology, Coimbatore, Tamil nadu, India
Abstract:
An inventive application for different condition in light of remote sensor systems is being produced in the business part. Discovering strings and blocking them without influencing the system is basic without expanding the overheads and vitality. In the proposed calculation called CTACK (Cluster trust based affirmation) for WSN depends on number of dynamic effective conveyances and Kalman Filter is utilized to anticipate the hub trust. In view of the trust estimation of whole course, affirmation is started on chosen bundles to diminish the control overhead. It is watched that bundle conveyance proportion enhances notwithstanding when vindictive hubs are distinguished and keep away from them in the course disclosure process.
Page(s): 287-291
DOI: DOI not available
Published: Journal: Pakistan Journal of Biotechnology, Volume: 15, Issue: 2, Year: 2018
Keywords:
Keywords are not available for this article.
References:
[1] Dhakne D. and P. Chatur, Distributed trust-based intrusion detection approach in wireless sensor network, Proc. IEEE Int. Conf. Commun. Control Intell. Syst., Nov. Pp. 96101 (2015)
[2] He, D., C. Chen, S. Chan, J. Bu and A.V. Vasilakos, Re Trust: Attack-resistent and lightweight trust mana-gement for medical sensor networks,” IEEE Trans. Inf. Technol. Biomed. 16(4): 623-632 (2012)
[3] Bao, F., I.-R. Chen, M. Chang and J. Cho, Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection.' IEEE Trans. Netw. Service Manage 9 (2): 169-183 (2012)
[4] Dhakne D.,P.Chatur,Nov, 2015.Distributed trust-based intrusion detection approach in wireless sensor network,Proc. IEEE Int. Conf. Commun. Control Intell 96101 -
[5] He,D. , C.,Chen , S.,Chan , J.,Bu and A.V.,Vasilakos, 2012.Attack-resistent and lightweight trust management for medical sensor networks,” IEEE Trans. Inf. Technol. Biomed 16 623 -632
[6] Bao , F.,I.-R.Chen,M.Chang,J.Cho, 2012.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,' IEEE Trans. Netw. Service Manage 9 169 -183
[7] Hao , F.,G.Min,M.Lin,C.Luo,L.Yang, 2014.An efficient fuzzy trus inference mechanism in mobile social networks,IEEE Trans. Parallel Distrib. Syst 25 2944 -2955
[8] Bao , F.,I.R.Chem,M.Chang,J.Cho, 2012.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,IEEE Trans. Netw. Service Manage 9 169 -183
[9] Han , G,J.Jiang,L.Shu,M.Guizani, 2015.An attackresistant trust model based on multidimensional trust matrics in under water acoustics sensor network,IEEE Trans. Mobile Comput 14 2447 -2459
[10] Butun , I., S.D.,Morgera and R.,Sankar, 2014.A survey of intrusion detection systems in wireless sensor networks,IEEE Commun. Surveys Tuts 16 234 -241
[11] OnatI.,A.Miri, 2005.An intrusion detection system for wireless sensor networks,Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun. Aug 253 259 -
[12] Rajesh kumar , T. and K.,Geetha, 2016.,International Journal of Innovative Research in Computer and Communication Engineering 4 -
[13] Rajesh kumar , T. and K.,Geetha,:, 2017.An Artificial Technique Based Approach for Channel Selection and Classification of Electroencephalogram Signals,International Journal of Printing, Packaging & Allied Sciences 5 -
[14] Rajesh kumar , T., K.,Geetha , R.,Satheesh and N.S.,Barkath, 2017.MRI Brain Image Segmentation using Fuzzy C Means Cluster Algorithm for Tumor Area Measurement,International Journal of Engineering Technology Science and Research 4 929 -935
[15] Rajesh kumar , T., S.,Preethi , R. Siva,Rubini and V.,Yamini, 2018.speed detecting and reporting system using GPS/GPRS AND GSM,International Journal of Pure and Applied Mathematics 118 73 -79
[16] Rajesh kumar , T., G.,N.N.Deepika,S.Priyadharshini, 2017.An Integrated Density Based Traffic Load Balancing System in A Cloud Environment,Pak. J. Biotechnol 14 623 -627
[17] Ganeriwal S.,M.Srivastava, 2004.Reputation-based framework for high integrity sensor networks,ACM Trans. Sensor Netw 4 66 -77
[18] Yu , Y.,K.Li,W.Zhou,P.Li, 2012.Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,J. Netw. Comput. Appl 867880 -
[19] ZhihuaZhang, 2017.Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks,IEEE Translations and content mining -
Citations
Citations are not available for this document.
0

Citations

0

Downloads

19

Views