Alinteri Journal of Agriculture Sciences The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the field of agriculture, fisheries, veterinary, biology, and closely related disciplines. We adopt the policy of providing open access to readers who may be interested in recent developments. Is being published online biannually as of 2007.
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
This paper describes the latest results of a research program that is designed to enhance the security of wireless mobile ad hoc networks (MANET) by developing a distributed intrusion detection capability. The current approach uses learning vector quantization neural networks that have the ability to identify patterns of network attacks in a distributed manner. This capability enables this approach to demonstrate a distributed analysis functionality that facilitates the detection of complex attacks against MANETs. The results of the evaluation of the approach and a discussion of additional areas of research is presented.
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
Security is considered as one of the major challenge when it comes to infrastructure less and self dependent network without any centralized control. The vulnerability of Adhoc Network makes it susceptible to external attacks like flooding of hello messages or propagating fake routing messages etc. Such attacks generates a variety of problems like disturbing the network by flooding messages that results in waste of battery which is a vital resource to maintain the life span of the network. Most importantly cause agents to die when unable to reach destination due to fake routing messages causing a heavy loss on part of the nodes generating them to maintain the route knowledge. The paper proposes a novel technique to identify the flooding attack and measure to overcome them using Multi-Agent system
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
This paper describes the latest results of a research program that is designed to enhance the security of wireless mobile ad hoc networks (MANET) by developing a distributed intrusion detection capability. The current approach uses learning vector quantization neural networks that have the ability to identify patterns of network attacks in a distributed manner. This capability enables this approach to demonstrate a distributed analysis functionality that facilitates the detection of complex attacks against MANETs. The results of the evaluation of the approach and a discussion of additional areas of research is presented.
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
Security is considered as one of the major challenge when it comes to infrastructure less and self dependent network without any centralized control. The vulnerability of Adhoc Network makes it susceptible to external attacks like flooding of hello messages or propagating fake routing messages etc. Such attacks generates a variety of problems like disturbing the network by flooding messages that results in waste of battery which is a vital resource to maintain the life span of the network. Most importantly cause agents to die when unable to reach destination due to fake routing messages causing a heavy loss on part of the nodes generating them to maintain the route knowledge. The paper proposes a novel technique to identify the flooding attack and measure to overcome them using Multi-Agent system
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A network is nothing but multiple nodes are
connected with each other in some manner. The communication
between each node and the topology of the network are important
to make the environment more efficient. The communications
between systems are broadly categorized into two; that are wired
and wireless communication. In wired network, each node will be
connected through physical wires and follows a topology. But in
wireless network the communication between each node will be
happen a centralized node called Access Point. In wireless
environment a special wireless network is called MANET, in
which there will be no centralized Access Points. MANET is
nothing but Mobile Ad-hoc NETwork. In MANET each node acts
as a sender and receiver. And there is no fixed route between
nodes. Based on the nodes reachable, node will change the
routing table dynamically. So the mobility and scalability of the
nodes will not impact the MANET. The self-configuring ability of
the MANET made it popular in military applications and
emergency recovery. So the communication between each node
should be more secure and trustable. And it’s important to
identify the malicious nodes in MANET too. The malicious nodes
are nodes which are not able to sends packets further or the
nodes which are sends false report to the sender. To identify these
malicious nodes and sends the messages with more secure with
authorization need to implement new Intrusion Identification
System called Digital Signature with Acknowledgement name as
Enhanced Adaptive Acknowledgement. The objective of MANET
is fast communication. So its need to analyze the network
throughput also once the new Intrusion Identification System
introduced.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
The mobile ad hoc network is an infrastructure less system of mobility appliance connected by wireless.
The system protection violate cannot be prohibited using access and information flow control. This violate may
be outcome system software and hardware failures interrelate system organizational actions or disappointment
of the system verification module. The required for generate the existing methods into more difficult is in
addition rising, because it result into fresh and other useful resolution. Intrusion detection is a significant part in
the detection system abuse in many cases in current research works. An intrusion detection system is the
capability to sense intruders and abuser actions in the system in a competent and sensible fashion. An Intruder
that collaborate a mobile node in MANET eliminates the communication between the nodes. By distribution
fake routing information, provided that false link status information, and plentiful other nodes with superfluous
routing traffic information. The dependency and decentralized of MANET facilitate a challenger to enlarge
innovative type of attacks that are measured to demolish the cooperative algorithms used in ad hoc networks.
MANET is mostly susceptible to several kinds of attacks like inactive eavesdropping, dynamic impersonation,
and denial of services. An Intruder that collaborate a mobile node in MANET obliterate the communication
between the nodes by dissemination fake routing information. If inaccurate link state information, and abundant
other nodes with superfluous routing traffic information. Therefore, successful implementation of MANET
based on user’s poise in its security. The security research in MANET has paying attention on key managing,
routing protocol and intrusion detection techniques. Assessment on intrusion detection and supportive layer in
MANET endow with resolution to extend their real world applications. In this paper, aspire to revision the
various intrusion detections and prevention systems that were anticipated for Mobile Ad hoc Networks
(MANETs). And then compare the latest techniques Intrusion Detection dependent on their architecture and
data gathering techniques
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management. IJMRR is an international forum for research that advances the theory and practice of management. The journal publishes original works with practical significance and academic value.
A network is nothing but multiple nodes are
connected with each other in some manner. The communication
between each node and the topology of the network are important
to make the environment more efficient. The communications
between systems are broadly categorized into two; that are wired
and wireless communication. In wired network, each node will be
connected through physical wires and follows a topology. But in
wireless network the communication between each node will be
happen a centralized node called Access Point. In wireless
environment a special wireless network is called MANET, in
which there will be no centralized Access Points. MANET is
nothing but Mobile Ad-hoc NETwork. In MANET each node acts
as a sender and receiver. And there is no fixed route between
nodes. Based on the nodes reachable, node will change the
routing table dynamically. So the mobility and scalability of the
nodes will not impact the MANET. The self-configuring ability of
the MANET made it popular in military applications and
emergency recovery. So the communication between each node
should be more secure and trustable. And it’s important to
identify the malicious nodes in MANET too. The malicious nodes
are nodes which are not able to sends packets further or the
nodes which are sends false report to the sender. To identify these
malicious nodes and sends the messages with more secure with
authorization need to implement new Intrusion Identification
System called Digital Signature with Acknowledgement name as
Enhanced Adaptive Acknowledgement. The objective of MANET
is fast communication. So its need to analyze the network
throughput also once the new Intrusion Identification System
introduced.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
The mobile ad hoc network is an infrastructure less system of mobility appliance connected by wireless.
The system protection violate cannot be prohibited using access and information flow control. This violate may
be outcome system software and hardware failures interrelate system organizational actions or disappointment
of the system verification module. The required for generate the existing methods into more difficult is in
addition rising, because it result into fresh and other useful resolution. Intrusion detection is a significant part in
the detection system abuse in many cases in current research works. An intrusion detection system is the
capability to sense intruders and abuser actions in the system in a competent and sensible fashion. An Intruder
that collaborate a mobile node in MANET eliminates the communication between the nodes. By distribution
fake routing information, provided that false link status information, and plentiful other nodes with superfluous
routing traffic information. The dependency and decentralized of MANET facilitate a challenger to enlarge
innovative type of attacks that are measured to demolish the cooperative algorithms used in ad hoc networks.
MANET is mostly susceptible to several kinds of attacks like inactive eavesdropping, dynamic impersonation,
and denial of services. An Intruder that collaborate a mobile node in MANET obliterate the communication
between the nodes by dissemination fake routing information. If inaccurate link state information, and abundant
other nodes with superfluous routing traffic information. Therefore, successful implementation of MANET
based on user’s poise in its security. The security research in MANET has paying attention on key managing,
routing protocol and intrusion detection techniques. Assessment on intrusion detection and supportive layer in
MANET endow with resolution to extend their real world applications. In this paper, aspire to revision the
various intrusion detections and prevention systems that were anticipated for Mobile Ad hoc Networks
(MANETs). And then compare the latest techniques Intrusion Detection dependent on their architecture and
data gathering techniques
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management. IJMRR is an international forum for research that advances the theory and practice of management. The journal publishes original works with practical significance and academic value.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
IJMRR is an international forum for research that advances the theory and practice of management. All papers submitted to IJMRR are subject to a double-blind peer review process. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. We adopt the policy of providing open access to readers who may be interested in recent developments.
Alinteri Journal of Agriculture Sciences is being published online biannually as of 2007. The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the fields of agriculture, fisheries, veterinary, biology, and closely related disciplines. Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. We adopt the policy of providing open access to readers who may be interested in recent developments.
Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. We adopt the policy of providing open access to readers who may be interested in recent developments. Alinteri Journal of Agriculture Sciences is being published online biannually as of 2007. The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the fields of agriculture, fisheries, veterinary, biology, and closely related disciplines.
IJERST offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors.
The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
All papers submitted to IJMRR are subject to a double-blind peer review process. IJMRR is an international forum for research that advances the theory and practice of management. The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors.
The journal publishes original works with practical significance and academic value. All papers submitted to IJMRR are subject to a double-blind peer review process. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
Alinteri Journal of Agriculture Sciences is being published online biannually as of 2007. Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the fields of agriculture, fisheries, veterinary, biology, and closely related disciplines. We adopt the policy of providing open access to readers who may be interested in recent developments.
All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal. ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process.
The journal publishes original works with practical significance and academic value. All papers submitted to IJMRR are subject to a double-blind Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, public sector management. peer review process. IJMRR is an international forum for research that advances the theory and practice of management.
All papers submitted to IJMRR are subject to a double-blind peer review process. The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management. IJMRR is an international forum for research that advances the theory and practice of management.
The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management. IJMRR is an international forum for research that advances the theory and practice of management. All papers submitted to IJMRR are subject to a double-blind peer review process.
Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. We adopt the policy of providing open access to readers who may be interested in recent developments. The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the field of agriculture, fisheries, veterinary, biology, and closely related disciplines. Alinteri Journal of Agriculture Sciences is being published online biannually as of 2007.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process.
International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Science journal
1. 76
Mobile Ad Hoc Networks Intrusion Detection in Co-Operative Motion
K. Pazhanisamy1*
• Dr. Latha Parthiban2
1*
Research Scholar, Pondicherry University, Pondicherry, India. E-mail: kpsamy09@gmail.com
2
Assistant Professor, Department of Computer Science, Pondicherry University (CC), Pondicherry, India.
E-mail: athaparthiban@yahoo.com
A R T I C L E I N F O
Article History:
Received: 30.04.2021
Accepted: 10.06.2021
Available Online: 12.07.2021
Keywords:
Partial Swarm Optimization
Intrusion Detection
Support vector Regression(SVR)
Cooperative Algorithm
Anomaly Detection
A B S T R A C T
As the number of wireless devices continues to increase rapidly, mobile ad hoc networking
(MANET) has emerged as an exciting and significant technological advance. MANETs were
susceptible to attacks because of their open media, continuously changing network design,
cooperation mechanisms, lack of a protective measure and management point, and a
coherent layer of attack. However, regular functioning frequently generates traffic
corresponding to a "signature attack," which leads to false alerts. One of the significant
disadvantages is the inability to identify new attacks without established signatures. In this
article, we describe our efforts towards creating the capability for MANET intrusion
detection (ID). Based on our previous works on outlier detection, we explore how Intrusion
Detection in Partial Swarm Optimization (IDPSO) and Support vector Regression(SVR) may
improve an anomaly detection method to give additional information about attack kinds and
origins. We can use a basic formula to determine the attack type for many well-known
assaults whenever an anomaly is detected.
Please cite this paper as follows:
Pazhanisamy, K. and Dr. Parthiban, L. (2021). Mobile Ad Hoc Networks Intrusion Detection in Co-Operative Motion. Alinteri Journal of
Agriculture Sciences, 36(2): 76-81. doi: 10.47059/alinteri/V36I2/AJAS21117
Introduction
With wireless devices like Wireless telephones, PDAs
and mobile laptop computers rapidly spread over the past
several years, the potential and significance of mobile Ad
Hoc networking are becoming evident. A MANET create by a
collection of wireless mobile nodes which frequently have no
fixed network support. The nodes must collaborate by
sending packets to connect with nodes across the radio
range. Many major MANET applications are available [3].
All wireless communication technology needs
collaboration since the systems to need to work
cooperatively, and at least the edge hosts need compatible
and somewhat defined transmission methods and protocols.
However, the cooperation requirement for Ad Hoc networks
is extremely severe and maintained at all levels of the
system. In the appropriate environment, cooperative did not
always anticipate these difficulties.
* Corresponding author: kpsamy09@gmail.com
The downloading of sensitive information to public
cloud providers present safety concerns, including
accessibility, privacy and business integration. In addition,
non-stop cloud providers have resulted in high levels of
infiltration and abuse. The only permanent option to
safeguard information and cloud resources for users is the
deployment of firewalls and intruder detection systems.
Some attacks, such as DOS, are too sophisticated for
firewalls; you may employ attack detection techniques to
identify different kinds of attacks.
Intelligent and meta-heuristic algorithms have recently
become the most utilises methods of attack detection.
Meta-heuristic algorithms may use to analyse attack
databases or to maximize and improve classifier accuracy.
These techniques are thus trustworthy and appropriate for
assaults and abnormalities. SVR was used to categorize the
assaults, and then IDPSO utilises the method Particle Swarm
to improve and enhance the accuracy of this classification.
Figure 1 shows the intrusion detection architecture for
MANET.
In this work, the IDPSO functions are implemented and
SVR utilises as evaluator for the PSO genetic algorithm using
Alinteri J. of Agr. Sci. (2021) 36(2): 76-81
e-ISSN: 2587-2249
info@alinteridergisi.com
http://dergipark.gov.tr/alinterizbd
http://www.alinteridergisi.com/
DOI:10.47059/alinteri/V36I2/AJAS21117
RESEARCH ARTICLE
2. Pazhanisamy, K. and Dr. Parthiban, L. (2021). Alınteri Journal of Agriculture Sciences 36(2): 76-81
77
a single-to-rest approach arising a multi-user issue literature.
The findings show that our approach has shown a higher
accuracy compared to the classification methods.
Figure 1. The intrusion detection architecture for MANET
Related Work
Attacks on a node as an individual can occur in a
network, and the attack locations are not limited to a
specific layer of protocol, and may impact multiple protocol
layers simultaneously. Malicious attacks can occur on a node
as an individual in a network, and they are not limited to a
specific protocol layer[1]. A technique for detecting[2] the
lost packages on the basis of only one hashing chain and a
unique hash tag commitment. The way the technique is
implemented largely relies on the way redundant data
packets are sent and secret keys are shared across nodes.
The source node must also anticipate the transmitted status
of the next packet header. The main disadvantage of the
method is that latency management is already too large,
especially whenever the networking size is larger, a public
key can be guaranteed of being transmitted.
The FS method [7] and classification using a (SVM)
Vector Support Machine. The study also included the
examination of intrusion detection and FS categorization
methods. In addition, soft computing methods emphasize
the research difficulties of intrusion detection: PCA and
(PSO) FS particle swarm optimization for transformation
features. The theoretical approach for intrusion detection
presented using the SVM Classification on the datasets KDD
Cup 99. This study effort further expanded utilizing the NSL-
KDD datasets neural network. [9]evaluated various
computing SR techniques and found that regression methods
have disadvantages in identifying and usually out
performance of unknown parameters. The unknown
regression technique parameters calculated via optimization.
A novel distributed clustering[10] technique for lengthy,
prototype-implemented Ad Hoc sensor networks. Besides the
available load levels in sink node, The approach provided
doesn't really assume any infrastructure presence or node
characteristics in general. An energy-efficient distributed
clustering technique, Hybrid Energy-Efficient Distributed
clustering (HEED), is given here that chooses heads of
cluster on an ongoing basis that are appropriate for each
node's remaining energy and its closeness to node degree or
other nodes. HEED completes the job with O-turns, makes a
little overhead message that obtains a fairly consistent
distribution of cluster heads throughout the networks.
A method to hybrid node scheduling[11], it includes
sleep schedules in time-drived modes for regular monitoring
areas of interest and weather schedules event-driven modes
for tracking emergencies. A error rate is incorporated in the
sleeping pattern to improve reliability in the sensor nodes. A
wake-up sensors threshold and normal sleep restriction are
provided in the awakening plan to minimize energy use.
The Extended Version of the SEER Protocol is a Basic
Energy-Aware Routing Protocol (BEAR) [12]. In-network set-
up authors introduce a novel method to balance the network
by computing a likelihood for each neighbouring node and
using the probability for selecting the delivery node instead
of remaining energy in SEER. They also utilized an
apprenticeship to maintain the level of power of each node
where the significance of the sender added to the data
header. There is thus no requirement for energy
communication such as the SEER protocol.
Proposed Work
In this part, we review our previous anomaly detection
work and explain how to figure out the kinds of attacks and
origins of certain known assaults after reports of an
abnormality. Let's start by describing various MANET assaults
and the incursions in our tests.
MANET Attacks
About intrusion detection and reaction, abnormalities
related to both the result and the method of the assault
should be observed and analyzed. While this shows that an
assault occurred or is spreading, the technique may
3. Pazhanisamy, K. and Dr. Parthiban, L. (2021). Alınteri Journal of Agriculture Sciences 36(2): 76-81
78
frequently assist in determining the attacker's kind and even
the identity.
According to their effects, MANET attacks may be
classified as follows:
Deprivation of sleep: a node is obliged to expend its
power.
Egoism: A node is not a conduit to other nodes.
Rushing: may be utilized to enhance the messages from
the manufactured route. Certain routing communication
classes have the characteristic that the receiver recognizes
only a message arriving first in multiple routing protocols.
The attacker merely distributes a fraudulent control signal
to prevent subsequent legal communications.
Routing Loop: Added a loop in a route path.
Partition of Network: A linked network subdivided into
k subnetworks, where nodes in various subnetworks cannot
interact while a route exists between them.
Dropping packet: A node loses packets of data it should
transmit.
Spoofing: injecting or controlling packets with amended
source addresses.
Denial-of-Service: A node cannot receive and transmit
data packets to destinations.
Blackhole: All traffic routed to a particular node that
cannot transmit any traffic.
Manufactured route message: harmful content
messages (route requests, route responses, etc.) will
injected into a network. The techniques specified include:
Poisoning cache: the information saved in the tables is
either amended, erased or misrepresented.
Wormhole: between two nodes, a tunnel used for the
covert transmission of packets formed.
Malignant swamping: Deliver extraordinarily vast
amounts of information or controlling messages to the entire
network or specific target nodes.
Particle Swam Optimization
The next branch of evolutionary algorithms, based on
team dynamics and synergy, is Particle Swarm Optimization
(PSO). It was born of coordinated action simulators in big
birds or in fish schools. Such algorithm utilize n-dimension
particles to look for solutions for an n-variable operational
optimization process, since these animals wander about a 3-
dimensional world, seeking food or avoiding predators.
Individuals in PSO are referred to as particles, while the
whole community referred to as a swarm[4].
The starting swarm usually generated to disperse the
populations of the particle uniformly across the search area.
Every particle is updated at all times, following two "best"
values, termed pbest and gbest. Each particle maintains
records of its locations in the issue space linked with the
particle's best solution (fitness). Stored this fitness value and
named pbest. When a particle accepts whole populations as
its topographical neighbour, the best deal is a "best" global
value and is termed gbest. The PSO's pseudo-code provided
below.
We first selected the necessary particle number based
on particle swarm principles and then randomly generated
the initial alphabetical string coding for each particle. We
encoded each particle in evolutionary algorithms for the
imitation of the chromosomes. The S=F1 K Fn, n=1, 2, k, m
binary alphabetic string has coded for each particle; the bit
{1} indicates a chosen feature, while the bit {0} indicates a
non-selected function.
Each renewal of particles is dependent on their
adaptive value. For each particle renewal, the best adaptive
value is pbest, and the most significant adaptive value within
such a pbest group is gbest. Once we have pbest and gbest, we
can monitor pbest and gbest particle characteristics in terms of
their location and speed. The research uses a binary
representation of a PSO algorithm for optimizing particle
swarm[5]. The area within each particle provided in a binary
number from which the fitness required.
Initially, SVMs (Support Vector Machines) developed to
solve issue classification[31]. SVR is an SVM variant[6]. The
SVR model's fundamental functions intended to give a non-
linear mapping function that can map the training data to
ample functional space. The training data set is indicated by
the input location, the actual output and the amount of the
data; it is the SVR function
𝑎 = 𝑓(𝑏𝑖) = 𝜔𝑀
𝜑(𝑏𝑖) + 𝑧 ………….. 1
𝑓(𝑏) = ∑(𝛼𝑖 − 𝛼𝑖
∗
)𝑚(𝑏𝑖, 𝑏)
𝑛
𝑖=1
+ 𝑧. . . . . . . . . . . . . . . . . . . . .2
𝛼𝑖 ∧ 𝛼𝑖
∗
consists of the Lagrange multipliers and is a
kernel function. When applied to the SVR input space, the
kernel function produces a nonlinear decision hypersurface.
The Stochastic radial basis (RBF) kernel, the most commonly
used kernel, conducts a mapping function between the
spatial domain and a high-dimensional space. Still, it is also
simple to construct, making it ideal for addressing nonlinear
issues; it was the motivation for using the Stochastic RBF
kernel in this research:
𝑘(𝑏𝑖, 𝑏) = 𝑒𝑥𝑝(−𝜎 ∨ 𝑏 − 𝑏𝑖 ∨2). . . . . . . . . . . .3
4. Pazhanisamy, K. and Dr. Parthiban, L. (2021). Alınteri Journal of Agriculture Sciences 36(2): 76-81
79
Figure 2. Flowchart for IDPSO and SVR
Results and Discussions
In this research, we use a standard datasets, which is
the raw data from the 2019 intrusion detection competition.
This database contains a large number of intrusions that
modeled in a militarized network environment, and it serves
as a standard benchmark for the assessment of intrusion
detection methods in general. In general, probes and denial-
of-service assaults account for the majority of all attacks.
Compromises, for example, are among the most intriguing
and hazardous assaults, but they are severely
underrepresented. Each connection record in the data set
contains 41 characteristics, plus one class label, which totals
42 attributes in total. There are 24 different attack kinds,
but we consider them all as a single attack group. It is
necessary to process a data collection of size N. The nominal
characteristics transformed into nonlinear numerical values
via a linear discrete value transformation (integers). After
the labels removed, the data set may represent a vector X
with N row and m=41 column (attributes). There are eight
discrete-value characteristics and thirty-three continuous-
valued attributes in the database. Table 1 describes the
daaset of KDD intrusion detection.
Table 1. Intrusion detection KDD dataset
Category types Occurrence percentage Instances
Network 20.0134 55,236
Blackhole 0.023 5,266
Dos 5.377 2,11,853
Probe 1,370 100
Whitehole 71.002 17,432
Figure 3. Occurrence of attacks percentage
Table 2. Comparison with proposed work
Methods Accuracy
MI-BGSA[13] 88.36
Proposed approach 99.32
Figure 4. Comparison chart
Conclusion and Future work
In this work we use vector regression techniques and
optimization of particle swarm for intrusion detection in
order to avoid a harsh characterization among-st regular
class and specific intrusion classes. We discuss the current
state of IDPSO and SVR based intrusion detection systems,
and propose potential data mining-based solutions. PSO, SVR
based techniques for network security data minimization are
explored. The detection model of intrusion is a
compositional model requiring several theories and methods.
Either one two models can rarely provide satisfactory results.
We intend to use additional intrusion detection theories and
methods in our research plan.
6. Pazhanisamy, K. and Dr. Parthiban, L. (2021). Alınteri Journal of Agriculture Sciences 36(2): 76-81
81
No.3, pp no.2561-2568, ISSN No: 1875-8967. March
2020
M.Vasim Babu, C.N.S. Vinoth Kumar, M.Venu, International
journal entitled “Improvisation of localization
accuracy using ERSSI based on ADV-HOP algorithm in
wireless sensor network“, International journal of
innovative technology and exploring engineering
(IJITEE), ISSN No.2278-3075 Feb 2019.
C.N.S. Vinoth Kumar, A.Suhasini, “Secured Three-Tier
Architecture for Wireless Sensor Networks Using
Chaotic Neural Networks”, ‘Advances in Intelligent
Systems and Computing’ AISC Series, Springer Science
+ Business Media Singapore 2017 Vol. No. 507,
Chapter No. 13, pp. No. 129-136, ISSN 2194-5357,
DOI 10.1007/978-981-10-2471-9_13
Deepa, N & Pandiaraja, P 2020, Electronic healthcare system
data privacy preserving efficient file retrieval from
the cloud service provider using attribute based file
encryption‟, in Journal of Ambient Intelligence and
Humanized Computing, DOI: 10.1007/s12652-020-
01911-5, Annexure I, Impact Factor: 4.594.
B. Baron, P. Spathis, M. Dias de Amorim, Y. Viniotis, and M.
H. Ammar, ‘‘Motion as an alternative communication
channel: A survey,’’ IEEE Commun. Surveys Tuts.,
vol. 21, no. 1, pp. 289–314, 1st Quart., 2019.