The effective intrusion detection system using optimal feature selection algorithm
by M. Poongodi; S. Bose; N. Ganeshkumar
International Journal of Enterprise Network Management (IJENM), Vol. 6, No. 4, 2015

Abstract: Wireless mobile networks consist of autonomous with a limited battery life; there are many challenges in identifying false data. False data is generally detected and dropped by the sink, but the false data travelling in the network causes a lot of battery wastage. The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources. The proposed solution involves using advanced encryption standard (AES) by deploying keys to the mobile ad hoc nodes when the network is first deployed. The data is verified by usage of message authentication code. Location and the time stamp of the forwarding nodes is monitored to detect unusual activity by the forwarding nodes.

Online publication date: Sun, 27-Dec-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Enterprise Network Management (IJENM):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com