Open Access Open Access  Restricted Access Subscription Access

To Enhance the Security in Wireless Nodes using Centralized and Synchronized IDS Technique


Affiliations
1 Department of Computer Science and Engineering, Lovely Professional University, Phagwara - 144411, Punjab, India
 

Objectives: Wireless technologies enable devices to communicate without any guided medium. It uses radio frequency for transmitting data, where the wired technologies use cables. It is mostly used to refer a telecommunications network that is interconnected between nodes and implemented without any kind of wires like as a computer network. Due to unguided media it’s very tedious to detect any intrusion during communication. The aim of this work is to develop an approach which will detect and prevent black hole attacks so the any unauthorized or unwanted nodes if participates in the communication process will be detected in the real time. Methods/Statistical Analysis: In our work we are going to propose IDS which will helps to provide security to detect attacks and to prevent the attacks. Centralize and synchronized IDS node will work on the basis of anomaly detection technique. It will create pattern for malicious activates and do event detection on the basis of anomaly detection. Findings: The proposed method will enhance the detection of anomaly detection techniques with synchronized IDS within the cluster as well as between the clusters with the help of DRI table. Application/Improvement: This technique will helps to enhance security in Wireless network and helps to make more reliable network for user.

Keywords

Attacks, Anomaly, Cluster, Intrusion Detection System, Malicious.
User

Abstract Views: 170

PDF Views: 0




  • To Enhance the Security in Wireless Nodes using Centralized and Synchronized IDS Technique

Abstract Views: 170  |  PDF Views: 0

Authors

Ravi Shanker
Department of Computer Science and Engineering, Lovely Professional University, Phagwara - 144411, Punjab, India
Ashish Kr. Luhach
Department of Computer Science and Engineering, Lovely Professional University, Phagwara - 144411, Punjab, India
Amit Sardar
Department of Computer Science and Engineering, Lovely Professional University, Phagwara - 144411, Punjab, India

Abstract


Objectives: Wireless technologies enable devices to communicate without any guided medium. It uses radio frequency for transmitting data, where the wired technologies use cables. It is mostly used to refer a telecommunications network that is interconnected between nodes and implemented without any kind of wires like as a computer network. Due to unguided media it’s very tedious to detect any intrusion during communication. The aim of this work is to develop an approach which will detect and prevent black hole attacks so the any unauthorized or unwanted nodes if participates in the communication process will be detected in the real time. Methods/Statistical Analysis: In our work we are going to propose IDS which will helps to provide security to detect attacks and to prevent the attacks. Centralize and synchronized IDS node will work on the basis of anomaly detection technique. It will create pattern for malicious activates and do event detection on the basis of anomaly detection. Findings: The proposed method will enhance the detection of anomaly detection techniques with synchronized IDS within the cluster as well as between the clusters with the help of DRI table. Application/Improvement: This technique will helps to enhance security in Wireless network and helps to make more reliable network for user.

Keywords


Attacks, Anomaly, Cluster, Intrusion Detection System, Malicious.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i32%2F128900