Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kiruthiga, G.
- A Service Package Identifier Based Security Verification Algorithm For Wireless Mobile AD-HOC Network
Abstract Views :199 |
PDF Views:0
Authors
R. Sabitha
1,
G. Kiruthiga
2
Affiliations
1 Department of Electronics and Communication Engineering, Hindustan College of Engineering and Technology, IN
2 Department of Computer Science and Engineering, IES College of Engineering, IN
1 Department of Electronics and Communication Engineering, Hindustan College of Engineering and Technology, IN
2 Department of Computer Science and Engineering, IES College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 13, No 1 (2022), Pagination: 2650-2655Abstract
In general, the biggest problem with a mobile ad-hoc network is the threat to its security. This is because the mobile ad-hoc network is dismantled after a certain period of time, which spends a lot of time calculating its stability and greatly wastes its security dimensions. Thus, the security features on these temporary networks need to be strengthened as they pose the most threats. In this paper, a security algorithm designed in SID mode is proposed to fix security vulnerabilities in the wireless mobile ad-hoc network module. Its main feature is that its security definitions are defined according to the number of Service Package Identification assigned to it. The definition of numbers based on its importance is to make a list of related devices in order and, accordingly, bring those devices into the security module. Its security features have been improved so that the security modules remain active as long as the network is active.Keywords
Service Package Identification, Ad-hoc Networks, MANET, Security, StabilityReferences
- S. Kannan, G. Dhiman, and M. Gheisari, “Ubiquitous Vehicular Ad-Hoc Network Computing using Deep Neural Network with IoT-Based Bat Agents for Traffic Management”, Electronics, Vol. 10, no. 7, pp. 785-796, 2021.
- M.E. Ahmed and H. Kim, “DDoS Attack Mitigation in Internet of Things Using Software Defined Networking”, Proceedings of International Conference on Big Data Computing Service and Applications, pp. 6-9, 2017.
- S. Banerjee and S. Khuller, “A Clustering Scheme for Hierarchical Control in Multi-Hop Wireless Networks”, Proceedings of IEEE International Conference on Computer and Communications Societies, pp. 102801037, 2001.
- L. Atzori and A. Iera, “The Internet of Things: A Survey”, Computer Networks, Vol. 54, No. 15, pp. 2787-2805, 2010.
- M.U. Bokhari, H.S.A. Hamatta and S.T. Siddigui, “A Review of Clustering Algorithms as Applied in MANETs”, International Journal Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 11, pp. 364369, 2012.
- R. Agarwal and M. Motwani, “Survey of Clustering Algorithms for MANET”, International Journal on Computer Science and Engineering, Vol. 1, No. 2, pp. 98104, 2009.
- B. Gobinathan, M.A. Mukunthan, S. Surendran, and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-7, 2021.
- N. Arivazhagan, K. Somasundaram, D. Vijendra Babu and V. Prabhu Sundramurthy, “Cloud-Internet of Health Things (IOHT) Task Scheduling using Hybrid Moth Flame Optimization with Deep Neural Network Algorithm for E Healthcare Systems”, Scientific Programming, Vol. 2022, pp. 1-8, 2022.
- P. Krishan, “A Study on Dynamic and Static Clustering based Routing Schemes for Wireless Sensor Networks”, International Journal of Modern Engineering Research, Vol. 3, No. 2, pp. 1100-1104, 2013.
- M. Malik and Y. Singh, “Analysis of Leach Protocol in Wireless Sensor Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 2, pp. 178-184, 2013.
- T. Kothmayr, C. Schmitt, W. Hu, M. Br and G. Carle, “DTLS based Security and Two-Way Authentication for the Internet of Things”, Ad Hoc Networks, Vol. 11, No. 8, pp. 2710-2723, 2013.
- M. Wazid, A.K. Das, V. Odelu and N. Kumar, “Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks”, IEEE Internet of Things, Vol. 5, No. 1, pp. 269-282, 2017.
- G. Dhiman, K. Somasundaram and K. Sharma, “Nature Inspired-Based Approach for Automated Cyberbullying Classification on Multimedia Social Networking”, Mathematical Problems in Engineering, Vol. 2021, pp. 121, 2021.
- S. Soni and B. Dey, “Dynamic Selection of Cluster Head in Cluster of Cluster Heads within the Cluster in Heterogeneous Wireless Sensor Network”, Proceedings of IEEE International Conference on Advanced Communications, Control and Computing Technologies, pp. 877-881, 2014.
- N. Sabor, S. Sasaki, M. Abo Zahhad and S.M. Ahmed, “A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions”, Wireless Communications and Mobile Computing, Vol. 2017, pp. 119, 2017.
- X. Liu, “A Typical Hierarchical Routing Protocols for Wireless Sensor Networks: A Review”, IEEE Sensors, Vol. 15, No. 10, pp. 5372-5383, 2015.
- S. Anjali and M. Sharma, “Wireless Sensor Networks: Routing Protocols and Security Issues”, Proceedings of International Conference on Computer Communication Networking Technologies, pp. 3-7, 2014.
- T. Bhatia, S. Kansal, S. Goel and A.K. Verma, “A Genetic Algorithm based Distance-Aware Routing Protocol for Wireless Sensor Networks”, Computer and Electrical Engineering, Vol. 56, pp. 441-455, 2016.
- P. Sivakumar and M. Radhika, “Performance Analysis of LEACH-GA over LEACH and LEACH-C in WSN”, Procedia Computer Science, Vol. 125, pp. 248-256, 2018.
- A. Peiravi, H.R. Mashhadi and S. Hamed Javadi, “An Optimal Energy-Efficient Clustering Method in Wireless Sensor Networks using Multi-Objective Genetic Algorithm”, International Journal of Communication Systems, Vol. 26, No. 1, pp. 114-126, 2013.
- Design of Intrusion Prevention System in Internet of Things Communication
Abstract Views :75 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science and Engineering, Government College of Engineering Thirssur, IN
2 Department of Computer Science and Engineering, IES College of Engineering, IN
1 Department of Computer Science and Engineering, Government College of Engineering Thirssur, IN
2 Department of Computer Science and Engineering, IES College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 13, No 2 (2022), Pagination: 2718-2722Abstract
In this paper, we model a CAN bus controller for data communication in Internet of Things (IoT) Network. However, most communication taking place via CAN bus may prone to attack. Hence aligning security with Intrusion Prevention System (IPS) to detect and mitigate attacks are required. In this paper, we hence model a IPS system over CAN communication. The model uses logs of communication to get trained and detect the attacks in the network. The simulation is conducted in NS2.34 tool to test the efficacy of the CAN-IoT Model. The results show that the proposed method has higher detection rate than other methods.Keywords
CAN Controller, Internet of Things, Intrusion Prevention System, Detection RateReferences
- Z. Liu, T. Tsuda and H. Watanabe, “Data Driven CyberPhysical System for Landslide Detection”, Mobile Networks and Applications, Vol. 24, No. 3, pp. 991-1002, 2019.
- N. Bibi, M.N. Majid, H. Dawood and P. Guo, “Automatic Parking Space Detection System”, Proceedings of International Conference on Multimedia and Image Processing, pp. 11-15, 2017.
- S. Aljawarneh, M. Aldwairi and M.B. Yassein, “AnomalyBased Intrusion Detection System through Feature Selection Analysis and Building Hybrid Efficient Model”, Journal of Computational Science, Vol. 25, pp. 152-160, 2018.
- Z. Li, C. Wang, C. Jiang and X. Li, “Multicast Capacity Scaling for Inhomogeneous Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 11, No. 1, pp. 29-38, 2013.
- S. Zhou and L. Ying, “On Delay Constrained Multicast Capacity of Largescale Mobile Ad-Hoc Networks”, Proceedings of International Conference on Communications and Networks, pp. 1-7, 2010.
- J.P. Jeong, T. He and D.H.C. Du, “TMA: Trajectory-based Multicast Forwarding for Efficient Multicast Data Delivery in Vehicular Networks”, Computer Networks, Vol. 57, No. 13, pp. 662-672, 2013.
- X. Ge, J. Yang, H. Gharavi and Y. Sun, “Energy Efficiency Challenges of 5G Small Cell Networks”, IEEE Communications Magazine, Vol. 55, No. 5, pp. 184-191, 2017.
- Y. Arta and R. Kharisma, “Simulasi Implementasi Intrusion Prevention System (IPS) Pada Router Mikrotik”, IT Journal Research and Development, Vol. 3, No. 1, pp. 104-114, 2018.
- A.S. Alqahtani and M. Alquraish, “On Implementing a Powerful Intrusion Prevention System Focused on Big Data”, The Journal of Supercomputing, Vol. 77, No. 12, pp. 14039-14052, 2021.
- T. Prasetyo, “Pengamanan Jaringan Komputer Dengan Intrusion Prevention System (IPS) Berbasis Sms Gateway”, Journal Teknologi Pintar, Vol. 2, No. 6, pp. 1-12, 2022.
- A. Krishna, A. Lal and M. Hari, “Intrusion Detection and Prevention System using Deep Learning”, Proceedings of International Conference on Electronics and Sustainable Communication Systems, pp. 273-278, 2021.
- A. Dushimimana, T. Tao and R. Kindong, “Bi-Directional Recurrent Neural Network for Intrusion Detection System (IDS) in the Internet of Things (IoT)”, International Journal of Advanced Engineering Research and Science, Vol. 7, No. 3, pp. 524-539, 2020.
- H. Larijani, J. Ahmad and N. Mtetwa, “A Heuristic Intrusion Detection System for Internet-of-Things (IoT)”, Proceedings of International Conference on Intelligent Computing, pp. 86-98, 2019.
- T. Alves and T. Morris, “Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers”, IEEE Embedded Systems Letters, Vol. 10, No. 3, pp. 99-102, 2018.
- G. Xian, “Cyber Intrusion Prevention for Large-Scale Semi-Supervised Deep Learning based on Local and Non-Local Regularization”, IEEE Access, Vol. 8, pp. 55526-55539, 2020.