سیستم تشخیص نفوذ هوشمند برای شناسایی گره های مخرب توسط رمزنگاری منحنی در MANET / Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET

سیستم تشخیص نفوذ هوشمند برای شناسایی گره های مخرب توسط رمزنگاری منحنی در MANET Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : Springer
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط مهندسی کامپیوتر و فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، شبکه های کامپیوتری
مجله محاسبه خوشه ای – Cluster Computing
دانشگاه IKG PTU – Kapurthala – Punjab – India

منتشر شده در نشریه اسپرینگر
کلمات کلیدی انگلیسی Multilevel trust based intelligent intrusion detection system, Mobile ad hoc networks (MANETs), Trust management, Elliptic curve cryptography (ECC) algorithm and malicious node

Description

1 Introduction MANETs have different aspects like security, IP addressing, routing, multiple access, service for handling wireless network communications. Network security is one of the major concerns in deploying the MANET applications, and thus, it gains interest among the researchers. In this section, the most important analysis is carried out in designing the secure framework, which would prevent the network from the attackers. Generally, MANETs are vulnerable in the operational functionality [1]; Interlopers can compromise the network activities by attacking any part of the network layers and Physical MAC; particularly, it affects network layer because of its poor routing algorithms, low-level batteries of the nodes, limited computational capacity of the nodes and undefined physical network location and short time nature of services in the wireless network [2]. Moreover, criterion followed for the measures of information security such as cryptography and key management scheme, have not given entire protection to the network [3]. Therefore, IDPS (intrusion and prevention system) are largely utilized to enhance the MANET security. An IDS is a combination of software and physical components, which highlights the system activities in order to identify undesirable activities and issues (Fig. 1). For example, illicit and destructive activity, that captures the activities of security policy failure and also identifies dissatisfactory level in the security mechanism [4]. IDS are mainly used for securing the network organization systems. The volatile development of the network frameworks can make the data exchange between the networks and computer, which is very crucial issues in the developing networking technology [5]. Meanwhile, it is a very difficult task to identify the attacker in the network which becomes hazardous in the network security, so, it needs to establish the proper procedure or protocol for security [6]. Intrusion generally refers to system attackers, which is causing vulnerable to various services such as hacking the information on the applications layer, host-based attack leads to login unapproved data or sensitive data that turns to be malware, viruses, worms and Trojan horses [7]. These types of attackers try to affect the confidentiality, integrity and accessibility of resources. Intrusions can also deny the administration’s activities, system network by neglecting responses to without reveal about the information being stolen or lost. Intrusion detection systems used for identifying unapproved resource utilization of a system and also discovers attackers on a system framework or networks.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری