Secured and anonymous data transmission in Manet environment using zone‐based intrusion detection system

Author(s):  
Nisha Soms ◽  
P. Malathi

Intrusion detection is the one of the major problem in network security, as the use of computer system and network increases, securing data is one of the important in order to achieve secure data transmission without hacking. Intrusions are the activities that violate the security policy of system. The process used to identify intrusions. Today network securities are used in various applications like protect vital information while still allowing access to those who need Trade secrets, Medical records etc. In this paper proposed to a novel hybrid intrusion detection framework methodology and its four various level of phases.


Author(s):  
Abidullha Adel ◽  
◽  
Md. Sohel Rana ◽  
Jayastree. J ◽  
◽  
...  

Wireless Sensor Network (WSN) subjected various challenges during data transmission between nodes deployed in a network. To withstand those security challenges Intrusion Detection System (IDS) is designed. IDS is involved in attack detection and classification but is subjected to a lack of effective classification techniques for attack prevention. To overcome those challenges associated with security this research presented an effective clustering technique known as Centred-Order Node Clustering (CONC). Also, Cluster Head (CH) is elected based on the Improved Flower Pollination Algorithm (IFPA) with multi-objective characteristics. By this proposed method lifetime of the network is improved. Additionally, a supervised classification technique called AdaBoost Regression Classifier (ABRC) is developed with the Intrusion Detection System (IDS). The developed ABRC is constructed for malicious node detection with the prediction of several attacks using IDS. Through improved security mechanisms sensor nodes are involved in effective data transmission between sensor nodes. The simulation analysis stated that the proposed mechanism provides better results rather than the existing technique.


Sign in / Sign up

Export Citation Format

Share Document