Energy-Efficient and Intruder Detection Method Using IDTSML Technique

Authors

  • Kiruthika B. Research scholar, Department of ECE, Saveetha school of engineering, Saveetha institute of medical and technical sciences,Chennai,India
  • Shyamalabharathi P. Assistant professor, Department of ECE, Saveetha school of engineering, Saveetha institute of medical and technical sciences, Chennai, India.

Keywords:

Intruder detection, IDTSML, SDN

Abstract

Aim:Wireless sensor networks are a rapidly developing technology. It has a wide range of applications. Because of its haphazard placement in the battlefield, it is vulnerable to a variety of attacks.

Objective: The dependability, privacy, and security of WSNs are the primary areas of study in our lab. To implement the encryption technique in SDN, we suggested a cryptography-based security mechanism.

Methods: We propose an IDTSML (Intelligent Dynamic Trust Secure Machine Learning) method for delivering security services to WSN mobos, and we analyze the associated energy and space costs. Secure Attacker Detection with Intelligent Dynamic Trust Routing is a revolutionary energy-aware routing strategy for Adhoc networks that will be proposed. IDTSML is an energy-efficient routing technique that determines the most energy-efficient end-to-end packet traversal paths while also increasing malicious node detection.

Conclusion:Improving the encryption and decryption parts of an existing technique, which paves the path for superior security.

Downloads

Download data is not yet available.

References

Kiruthika, B. (2023). Intelligent dynamic trust secure attacker detection routing for WSN-IoT networks. Mathematical Biosciences and Engineering, 20(2), 4243-4257.

N. A. Morsy, E. H.AbdelHay and S. S. Kishk,"Proposed energy efficient algorithm for clustering and routing in WSN," Wireless Personal Communications 103, no. 3: 2575-2598, 2018.

M. Shafiq,H. Ashraf, A. Ullah and S. Tahira, "Systematic literature review on energy efficient routing schemes in WSN–A survey," Mobile Networks and Applications 25, no. 3: 882-895, 2020.

L. Tang, Z. Lu, and B. Fan. "Energy efficient and reliable routing algorithm for wireless sensors networks," Applied Sciences 10, no. 5: 1885, 2020.

N. A. Alrajeh, and J. Lloret, "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks," International Journal of Distributed Sensor Networks 9, no. 10: 351047, 2013.

P. Singh and R. K. Chauhan, "A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN," International Journal of Electrical & Computer Engineering (2088-8708) 7, no. 4, 2017.

F. Liu, X. Cheng and D. Chen, "Insider attacker detection in wireless sensor networks," In IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, pp. 1937-1945, 2007.

E. C. Ngai, J. Liu, and M. R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Computer Communications 30, no. 11-12: 2353-2364, 2007.

K. M. Abdullah, E. H. Houssein, and H. H. Zayed, "New security protocol using hybrid cryptography algorithm for WSN," In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), pp. 1-6, 2018.

K. J. Choi and J. I. Song, "Investigation of feasible cryptographic algorithms for wireless sensor network," In 2006 8th International Conference Advanced Communication Technology, vol. 2, pp. 3-pp, 2006.

M. H. Ahmed, S. W. Alam, N. Qureshi, and I. Baig, "Security for WSN based on elliptic curve cryptography," In International Conference on Computer Networks and Information Technology, pp. 75-79, 2011.

R. Rizk, and Y. Alkady, "Two-phase hybrid cryptography algorithm for wireless sensor networks," Journal of Electrical Systems and Information Technology 2, no. 3: 296-313, 2015.

Dinakar, J. R. ., & S., V. . (2023). Real-Time Streaming Analytics using Big Data Paradigm and Predictive Modelling based on Deep Learning . International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 161–165. https://doi.org/10.17762/ijritcc.v11i4s.6323

Christopher Davies, Matthew Martinez, Catalina Fernández, Ana Flores, Anders Pedersen. Predicting Dropout Risk in Higher Education Using Machine Learning. Kuwait Journal of Machine Learning, 2(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/170

Downloads

Published

30.08.2023

How to Cite

B., K. ., & P., S. . (2023). Energy-Efficient and Intruder Detection Method Using IDTSML Technique. International Journal of Intelligent Systems and Applications in Engineering, 11(11s), 435–444. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3510

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.