EconPapers    
Economics at your fingertips  
 

The effective intrusion detection system using optimal feature selection algorithm

M. Poongodi, S. Bose and N. Ganeshkumar

International Journal of Enterprise Network Management, 2015, vol. 6, issue 4, 263-274

Abstract: Wireless mobile networks consist of autonomous with a limited battery life; there are many challenges in identifying false data. False data is generally detected and dropped by the sink, but the false data travelling in the network causes a lot of battery wastage. The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources. The proposed solution involves using advanced encryption standard (AES) by deploying keys to the mobile ad hoc nodes when the network is first deployed. The data is verified by usage of message authentication code. Location and the time stamp of the forwarding nodes is monitored to detect unusual activity by the forwarding nodes.

Keywords: gang injection; advanced encryption standard; AES; cooperative authentication; location mitigation; intrusion detection systems; feature selection; network security; data filtering; mobile ad hoc networks; MANETs; time stamp. (search for similar items in EconPapers)
Date: 2015
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=73869 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijenma:v:6:y:2015:i:4:p:263-274

Access Statistics for this article

More articles in International Journal of Enterprise Network Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijenma:v:6:y:2015:i:4:p:263-274