Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/522264
Title: | A certain investigation on intrusion detection system for ensuring secured data transmission in wireless sensor network |
Researcher: | Prabhu, T N |
Guide(s): | Karuppasamy, K |
Keywords: | Artificial Bee Colony Computer Science Computer Science Information Systems Engineering and Technology receiver and transmitter nodes wireless sensor networks |
University: | Anna University |
Completed Date: | 2023 |
Abstract: | The main area of attention in wireless sensor networks that needs to be newlinetaken carefully in order to identify safe and reliable data processing is newlineintrusion assault. The many aspects of intrusion assaults should be accurately newlinetailored since they have an effect on the correctness of the results of intrusion newlinedetecting. newlineIn the initial research study, hybrid genetic neuro fuzzy classifications newlinehave been introduced for the classification process. In addition, the genetic newlinealgorithm aids in the revision and optimum selection of the ANFIS weight newlinevalues. Finally, ABC (Artificial Bee Colony) algorithm chooses best routes newlinewhich serve as fitness factors for enhancing the accomplishment rate of data newlinetransferring. newlineSecond research work would place a secondary server between the newlinereceiver and transmitter nodes, through which data packets would be sent. newlineHere secondary server selection is done by using the method Improved newlinegenetic algorithm method. As discussed in the previous work, Bias and newlineVariance estimation is done to improvise the overall processing of the newlineresearch work. Finally Truncated SVM algorithm is introduced to learn and newlinepredict the presence of an attack. Optimal route path selection is done using newlineModified Mosquito Swarm Algorithm to select the shorter route path to newlinetransmit the data packet with reduced delay. Attack prevention is ensured by newlineintroducing the Modified Double key encryption procedure to be encrypted newlinebefore transmission. newline |
Pagination: | xvi,149p. |
URI: | http://hdl.handle.net/10603/522264 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 244.68 kB | Adobe PDF | View/Open |
03_contents.pdf | 615.3 kB | Adobe PDF | View/Open | |
04_abstracts.pdf | 181.38 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 582.66 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 520.2 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 732.97 kB | Adobe PDF | View/Open | |
08_chapter4.pdf | 751.86 kB | Adobe PDF | View/Open | |
09_chapter5.pdf | 673.4 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 2.24 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 57.53 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: