Energy-Efficient and Intruder Detection Method Using IDTSML Technique
Keywords:
Intruder detection, IDTSML, SDNAbstract
Aim:Wireless sensor networks are a rapidly developing technology. It has a wide range of applications. Because of its haphazard placement in the battlefield, it is vulnerable to a variety of attacks.
Objective: The dependability, privacy, and security of WSNs are the primary areas of study in our lab. To implement the encryption technique in SDN, we suggested a cryptography-based security mechanism.
Methods: We propose an IDTSML (Intelligent Dynamic Trust Secure Machine Learning) method for delivering security services to WSN mobos, and we analyze the associated energy and space costs. Secure Attacker Detection with Intelligent Dynamic Trust Routing is a revolutionary energy-aware routing strategy for Adhoc networks that will be proposed. IDTSML is an energy-efficient routing technique that determines the most energy-efficient end-to-end packet traversal paths while also increasing malicious node detection.
Conclusion:Improving the encryption and decryption parts of an existing technique, which paves the path for superior security.
Downloads
References
Kiruthika, B. (2023). Intelligent dynamic trust secure attacker detection routing for WSN-IoT networks. Mathematical Biosciences and Engineering, 20(2), 4243-4257.
N. A. Morsy, E. H.AbdelHay and S. S. Kishk,"Proposed energy efficient algorithm for clustering and routing in WSN," Wireless Personal Communications 103, no. 3: 2575-2598, 2018.
M. Shafiq,H. Ashraf, A. Ullah and S. Tahira, "Systematic literature review on energy efficient routing schemes in WSN–A survey," Mobile Networks and Applications 25, no. 3: 882-895, 2020.
L. Tang, Z. Lu, and B. Fan. "Energy efficient and reliable routing algorithm for wireless sensors networks," Applied Sciences 10, no. 5: 1885, 2020.
N. A. Alrajeh, and J. Lloret, "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks," International Journal of Distributed Sensor Networks 9, no. 10: 351047, 2013.
P. Singh and R. K. Chauhan, "A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN," International Journal of Electrical & Computer Engineering (2088-8708) 7, no. 4, 2017.
F. Liu, X. Cheng and D. Chen, "Insider attacker detection in wireless sensor networks," In IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, pp. 1937-1945, 2007.
E. C. Ngai, J. Liu, and M. R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Computer Communications 30, no. 11-12: 2353-2364, 2007.
K. M. Abdullah, E. H. Houssein, and H. H. Zayed, "New security protocol using hybrid cryptography algorithm for WSN," In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), pp. 1-6, 2018.
K. J. Choi and J. I. Song, "Investigation of feasible cryptographic algorithms for wireless sensor network," In 2006 8th International Conference Advanced Communication Technology, vol. 2, pp. 3-pp, 2006.
M. H. Ahmed, S. W. Alam, N. Qureshi, and I. Baig, "Security for WSN based on elliptic curve cryptography," In International Conference on Computer Networks and Information Technology, pp. 75-79, 2011.
R. Rizk, and Y. Alkady, "Two-phase hybrid cryptography algorithm for wireless sensor networks," Journal of Electrical Systems and Information Technology 2, no. 3: 296-313, 2015.
Dinakar, J. R. ., & S., V. . (2023). Real-Time Streaming Analytics using Big Data Paradigm and Predictive Modelling based on Deep Learning . International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 161–165. https://doi.org/10.17762/ijritcc.v11i4s.6323
Christopher Davies, Matthew Martinez, Catalina Fernández, Ana Flores, Anders Pedersen. Predicting Dropout Risk in Higher Education Using Machine Learning. Kuwait Journal of Machine Learning, 2(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/170
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.