An Implementation Approach for Intrusion Detection System in Wireless sensor Network
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. In this paper we have made an effort to document related issues and challenges of intrusion detection system for wireless sensor network and proposed a novel secure strategy for their mplementation that can detect possible intrusion in the network, alerting user after intrusion had been detected and reconfigure the network if possible.
Authors and Affiliations
Ruchi Bhatnagar , Dr. A. K. Srivastava , Anupriya Sharma
The K-Means Clustering used in Wireless Sensor Network
The past few years have witnessed increased interest in the potential use of wireless sensor networks in applications such as environment management and various surveillance. The Sensor nodes in these applications are ex...
AN ALGORITHM FOR STEERING CONTROL WITH SIMULATION RESULTS
The idea behind the paper was channelization of human thoughts to automated realization. It is decided to implement the theme of automatic maneuvering of vehicles and the unanimous choice of sensor was touch screen. It w...
An Efficient Protocol for Resource Constrained Platforms Using ECC
At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift t...
Experimenting with Request Assignment Simulator (RAS)
There is no existence of dedicated simulators on the Internet that studies the impact of load balancing principles of the cloud architectures. Request Assignment Simulator (RAS) is a customizable, visual tool that helps...
Overload Identification for Multiprocessor in Real Time System
In spite of many real time scheduling algorithms available it is not clear that these scheduling algorithms support fully the problems in the real time system in a local area network. There are certain “open loop” algori...