Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Anitha, A.
- Performance Analysis for Electronic Payment Systems
Abstract Views :238 |
PDF Views:4
Authors
Affiliations
1 Tamil University, Thanjavur, IN
2 Karpagam University, Coimbatore, IN
3 AM Jain College, Chennai, IN
1 Tamil University, Thanjavur, IN
2 Karpagam University, Coimbatore, IN
3 AM Jain College, Chennai, IN
Source
Networking and Communication Engineering, Vol 4, No 13 (2012), Pagination: 800-802Abstract
In this paper, thus the research analysis, design and implementation phase has been described for our research. It is proposed framework architecture for the Secure Multiparty Electronic Payments in mobile computing in order to support self-protection in AmI scenarios. The architecture of our framework is device-and platform independent and focuses on the use of auctions protocols for electronic payments policies. The top priority was the security of the auctions. All secret information that is exchanged between the auctions host and the peers is encrypted and protected against illegitimate modifications. it will extend the modularity of the proposed framework in order to allow individual utility functions and a replaceable module for determining the winning policy. Further, the integration of our framework into the refinement process of semantic high-level policies is in progress.Keywords
Multi-party Security, Mobile Computing, Cryptography, Negotiation.- A Hybrid Web Access Prediction Algorithm Using Agglomerative Clustering, Modified Markov Model and Association Rule
Abstract Views :308 |
PDF Views:4
Authors
Affiliations
1 Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Tirunelveli-627012, Tamil Nadu, IN
1 Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Tirunelveli-627012, Tamil Nadu, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 2, No 11 (2010), Pagination: 319-326Abstract
The explosive growth of data in the internet makes the people with difficulty in accessing interested pages. Although several methods including Markov model and association rule are available for web access prediction, they have their own limitations in terms of predicting ability and state space complexity. In this paper, it is proposed to identify browsing pattern of people having similar interest using agglomerative clustering approach using k nearest neighbors, modified Markov model and association rule mining. The goal of this paper is to improve prediction accuracy. The homogeneity of clusters is improved very well by exact agglomeration. While doing agglomerative clustering there exist a trade-off between speed and accuracy. The slowness is overcome by reducing the object considered during agglomeration to k, instead of N-1 and by eliminating distant neighbors having similarity value above predefined threshold. Unlike rough sets, this approach considers objects that definitely belonging to a cluster during agglomeration. Hence, cluster validity is improved and computational complexity is reduced. Then, a dynamic Markov model is applied to generate matching states dynamically using cluster for test session. When ambiguity arises, Association rule mining and time-stamp parameter are used to resolve prediction conflicts. The comparative results are presented depicting the improvement in predictive accuracy of the proposed hybrid approach over other systems.Keywords
Agglomerative Clustering, Association Rule, Markov Model, Pattern Discovery.- Intrusion Detection System Based on Artificial Intelligence
Abstract Views :1021 |
PDF Views:6
Authors
Affiliations
1 School of Information Technology and Engineering, VIT University, Vellore, IN
2 VIT University, Vellore, IN
1 School of Information Technology and Engineering, VIT University, Vellore, IN
2 VIT University, Vellore, IN
Source
International Journal of Technology, Vol 7, No 1 (2017), Pagination: 20-24Abstract
The Internet plays a major role in today’s environment but many attacks are happening over the networks and it may cause serious issues. Intrusion detection system provides a way to prevent the network anomalies and threats. It plays a vital role in network security. The violation activity happenings over the networks can be prevented by intrusion detection system, it collects the detected activity using security information and event management (SIEM). Some IDS have the ability to respond to the detected intrusions. Systems with response capabilities are typically referred to as an intrusion prevention system. There are many techniques which are used to design IDSs for specific scenario and applications. Artificial intelligence techniques are mostly used for threats detection.Keywords
Intrusion Detection, Neural Networks, Knowledge Base.References
- Alrajeh, Nabil Ali, and Jaime Lloret. "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. "International Journal of Distributed Sensor Networks (2013).
- P. Srinivasu, P.S. Avadhani, V. Korimilli, P. Ravipati, Approaches and Data Processing Techniques for Intrusion Detection Systems", Vol. 9, No. 12, 2009.
- Alrajeh N., Khan S., Shams B.Intrusion detection systems in wireless sensor networks: a review International Journal of Distributed Sensor Networks 2013
- Alrajeh N., Khan S., Lloret J., Loo J.Artificial neural network based detection of energy exhaustion attacks in wireless sensor networks capable of energy harvesting Journal of Ad Hoc and Sensor Wireless Networks2013
- Li Y. Y., Parker L. E.Intruder detection using a wireless sensor network with an intelligent mobile robot response Proceedings of the IEEE Southeast Conference April 2008
- Mukherjee P., Sen S.Using learned data patterns to detect malicious nodes in sensor networks Distributed Computing and Networking2008.Berlin, Germany Springer.
- Marcos M. Campos, Boriana L. Milenova, Creation and Deployment of Data Mining-Based Intrusion Detection Systems in Oracle Database 10g", in Proceedings of the Fourth International Conference on Machine Learning and Applications, 2005.
- Goyal A., Kumar C.GA-NIDS: a genetic algorithm based network intrusion detection system2008
- D. Md. Farid, M. Z. Rahman, Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm", in Journal of Computers, Vol. 5, no. 1, January 2010.
- Khanna R., Liu H., Chen H.-H.Reduced complexity intrusion detection in sensor networks using genetic algorithm Proceedings of the IEEE International Conference on Communications (ICC '09)June 2009
- Effect of Gamma Irradiation on the Ultrasonic and Optical Properties of PMMA
Abstract Views :273 |
PDF Views:0
Authors
Affiliations
1 Department of Physics, Thiagarajar College, Madurai-625009, IN
2 Non-Destructive Evaluation Division, Indira Gandhi Centre for Atomic Research, Kalpakkam-603102, IN
1 Department of Physics, Thiagarajar College, Madurai-625009, IN
2 Non-Destructive Evaluation Division, Indira Gandhi Centre for Atomic Research, Kalpakkam-603102, IN
Source
Journal of Pure and Applied Ultrasonics, Vol 36, No 2-3 (2014), Pagination: 51-55Abstract
Polymethylmethacrylate (PMMA) sample of 10 mm thickness and 15 mm diameter were prepared form a half a meter rod and exposed to ϒ-ray dose of different duration in an irradiation chamber with Ir-192 source. The polymer has been subjected to gamma radiation from 45 to 177 mGy dosages. Characterization by Ultrasonics, Fourier transform infra-red spectroscopy (FTIR) and ultraviolet-visible (UV-Vis) was done before and after irradiation. Precise ultrasonic measurements were made in the irradiated sample using 2 MHz longitudinal ultrasonic wave contact type transducer. Ultrasonic velocity measurements have been employed to investigate the microstructural changes in the irradiated sample. It was found that there is a decrease in velocity as the exposed dose is increased. FTIR study for the irradiated samples shows the enhanced CH stretching vibration. The UV-Vis studies for the irradiated samples indicate the shift in wavelength of absorption bands with the increasing irradiation dose was recorded. The result shows the variation in structural and optical properties of PMMA which is helpful for its stability under mild dose irradiations.Keywords
ϒ-Ray Irradiation, Ultrasonic Velocity, FTIR, UV-Visible.- Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication
Abstract Views :208 |
PDF Views:0
Authors
A. Anitha
1,
S. Mythili
2
Affiliations
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu., IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 3 (2023), Pagination: 443-455Abstract
Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.Keywords
Cluster Head, Cluster Member, Intra-Cluster, Multi-Hop, Clustering, Wireless Sensor Networks, Uncertainty, Robust, Fuzzy Membership, Entropy.References
- Jayachandran J, Vimala Devi K, "A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks", International Journal of Computer Networks and Applications (IJCNA), 9(6), PP: 785-805, 2022, DOI: 10.22247/ijcna/2022/217710.
- Iqbal, U., & Mir, A. H. (2022). Secure and practical access control mechanism for WSN with node privacy. Journal of King Saud University-Computer and Information Sciences, 34(6), 3630-3646.
- Feng H, Fu W. Study of recent development about privacy and security of the internet of things. In: 2010 international conference on web information systems and mining, Sanya, China, 23 October 2010. IEEE, pp. 91–95.
- Anitha, S.Mythili, “An Approach for Detection and Prevention of Cluster Head and Cluster Member from Selective Forwarding Attacks and Black Hole Attack in Intra-Cluster Multi-Hop Communication,” Design Engineering, Vol. 2021, Issue.06, pp. 1032-1060.
- Bouarourou, Soukaina & Zannou, Abderrahim & Boulaalam, Abdelhak & Nfaoui, El Habib. (2022). Sensors Deployment in IoT Environment. 10.1007/978-3-031-01942-5_27.
- Munir, A.; Gordon-Ross, A.; Ranka, S. Multi-core Embedded Wireless Sensor Networks: Architecture and Applications. In IEEE Transactions on Parallel and Distributed Systems (TPDS); IEEE: Piscataway, NJ, USA, 2014; Volume 25, pp. 1553–1562
- Faris M, Mahmud MN, Salleh MFM, Alnoor A. Wireless sensor network security: A recent review based on state-of-the-art works. International Journal of Engineering Business Management. 2023;15.
- Tam, Nguyen & Dat, Vi & Lan, Phan & Binh, Huynh & Vinh, Le & Swami, Ananthram. (2021). Multifactorial evolutionary optimization to maximize lifetime of wireless sensor network. Information Sciences. 576. 10.1016/j.ins.2021.06.056.
- Maivizhi, Radhakrishnan & Yogesh, Palanichamy. (2021). Q-learning based routing for in-network aggregation in wireless sensor networks. Wireless Networks. 27. 1-20. 10.1007/s11276-021-02564-8.
- Lalitha, K., Thangaraja, R., Siba, K. U., Poongodi, C., & Prasad, S. A. (2017). GCCR: An efficient grid based clustering and combinational routing in wireless sensor networks. Wireless Personal Communications.
- Turgut, “Analysing Multi-hop Intra-Cluster Communication in Cluster-Based Wireless Sensor Networks”, Natural and Engineering Sciences (2019).
- Mezghani, M, “An Efficient Multi-Hops Clustering and Data Routing for WSNs based on Khalimsky IpekAbasıkeleş Shortest Paths,” Journal of Ambient and Intelligence and Humanized Computing, Vol. 10, 1275-1288, 2019.
- D.Wu, S. Gene, X. Cai, G. Zhang and F.Xue, “ A Many-Objective Optimization WSN Energy Balance Model,” KSSII Transactions on Internet and Informatiom Systems, Vol.14, No. 2, pp. 514-537, 2020.
- H. El Alami and A. Najid, “ECH: An Enhanced Clustering Hierarchy Approach To Maximize Lifetime of Wireless Sensor Networks,” IEEE Access, Vol. 7,pp. 107145-107153,2019.
- Gohar Ali, Fernando Moreira, Omar Alfandi, Babar Shah and Mohammed Ilyas, “A New Intra-Cluster Scheduling Scheme for Real-Time Flows in Wireless Sensor Networks,” Electronics 9, No.4, 2020.
- Hasan A, Khan MA, Shabir B, Munir A, Malik AW, Anwar Z, Ahmad J. Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences. 2022; 12(22):11442.
- Malik A, Khan MZ, Faisal M, Khan F, Seo J-T. An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors. 2022; 22(5):189
- Ali, Haider & Tariq, Umair & Hussain, Mubashir & Lu, Liu & Panneerselvam, John & Zhai, Xiaojun. (2020). ARSH-FATI a Novel Metaheuristic for Cluster Head Selection in Wireless Sensor Networks. IEEE Systems Journal. PP. 1-12. 10.1109/JSYST.2020.2986811.
- Amutha, J. & Sharma, Sandeep & Sharma, Sanjay. (2021). Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Computer Science Review. 40. 100376. 10.1016/j.cosrev.2021.100376.
- Rawat, Piyush & Chauhan, Siddhartha. (2021). Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions. Computer Science Review. 40. 100396. 10.1016/j.cosrev.2021.100396.
- S. Ramesh, R. Rajalakshmi, Jaiprakash Narain Dwivedi , S. Selvakanmani, Bhaskar Pant, N. Bharath Kumar , Zelalem Fissiha Demssie, Optimization of Leach Protocol in Wireless Sensor Network Using Machine Learning, Computational Intelligence and Neuroscience Volume 2022, Article ID 53932, 8 pages.
- M. Sangeetha, and A. Sabari, “Genetic optimization of hybrid clustering algorithm in mobile wireless sensor networks,” Sensor Review, vol. 38, no. 4, pp. 526-533, 2018.
- Zannou, A., Boulaalam, A., & Nfaoui, E. H. (2022). Data Flow Optimization in the Internet of Things. Statistics, Optimization & Information Computing, 10(1), 93-106. https://doi.org/10.19139/soic-2310-5070-1166. How to cite this article:
- Firas Ali Al-Juboori & Ismail, E. S. F. (2014). A modified fuzzy C-means cluster-based approach for wireless sensor network. The Mediterranean Journal of Electronics and Communications, 10(2).
- D. Hongjun, J. Zhiping and D. Xiaona, "An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks," 2008 International Conference on Embedded Software and Systems, Chengdu, China, 2008, pp. 27-34.
- Empowered Chicken Swarm Optimization with Intuitionistic Fuzzy Trust Model for Optimized Secure and Energy Aware Data Transmission in Clustered Wireless Sensor Networks
Abstract Views :211 |
PDF Views:1
Authors
A. Anitha
1,
S. Mythili
2
Affiliations
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Kongunadu Arts and Science College, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 4 (2023), Pagination: 511-526Abstract
Each sensor node functions autonomously to conduct data transmission in wireless sensor networks. It is very essential to focus on energy dissipation and sensor nodes lifespan. There are many existing energy consumption models, and the problem of selecting optimized cluster head along with efficient path selection is still challenging. To address this energy consumption issue in an effective way the proposed work is designed with a two-phase model for performing cluster head selection, clustering, and optimized route selection for the secure transmission of data packets with reduced overhead. The scope of the proposed methodology is to choose the most prominent cluster head and assistant cluster head which aids in prolonging the network lifespan and also securing the inter-cluster components from selective forwarding attack (SFA) and black hole attack (BHA). The proposed methodology is Empowered Chicken Swarm Optimization (ECSO) with Intuitionistic Fuzzy Trust Model (IFTM) in Inter-Cluster communication. ECSO provides an efficient clustering technique and cluster head selection and IFTM provides a secure and fast routing path from SFA and BHA for Inter-Cluster Single-Hop and Multi-Hop Communication. ESCO uses chaos theory for local optima in cluster head selection. The IFTM incorporates reliance of neighbourhood nodes, derived confidence of nodes, estimation of data propagation of nodes and an element of trustworthiness of nodes are used to implement security in inter-cluster communication. Experimental results prove that the proposed methodology outperforms the existing approaches by increasing packet delivery ratio and throughput, and minimizing packet drop ratio and energy consumption.Keywords
Wireless Sensor Networks, Chicken Swarm Optimization, Intuitionistic Fuzzy Trust Model, Energy Aware, Security, Cluster Head, Clustering and Inter-Cluster Communication.References
- M. Jain and H. Kandwal, “A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks,” in International Conference Advances in Computing, Control, and Telecomm. Technologies (ACT ’09), pp. 555-558 (2009).
- He Z, Chen L, Li F, Jin G (2023) A fuzzy model for content-centric routing in Zigbee-based wireless sensor networks (WSNs). PLoS ONE 18(6): e0286913. https://doi.org/10.1371/journal.pone.0286913
- Sathish kumar, R., Ramesh C, “A modified method for preventing black-hole attack in mobile ad hoc networks,” in J. Eng. Appl. Sci. 11(2), 182–191 (2016)
- M. Shinde and D. C. Mehetre, “Black Hole and Selective Forwarding Attack Detection and Prevention in WSN,” in 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, pp. 1-6,(2017).
- Saleh, A.; Joshi, P.; Rathore, R.S.; Sengar, S.S. Trust-Aware Routing Mechanism through an Edge Node for IoT-Enabled Sensor Networks. Sensors 2022, 22, 7820. https://doi.org/10.3390/s22207820
- Yao, Y., Chen, W., Guo, J. et al. Simplified clustering and improved intercluster cooperation approach for wireless sensor network energy balanced routing. J Wireless Com Network 2020, 131 (2020). https://doi.org/10.1186/s13638-020-01748-8
- Srinivas, T. A., S-S, M, “Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing,” in Journal of Ambient Intelligence and Smart Environments, 13(2):133–156, (2021).
- C. Lai, H. Li, R. Lu and X. S. Shen, “SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks,” in Comput. Netw., vol. 57, no. 17, pp. 3492-3510, December (2013).
- El Khediri, Salim Khan, Rehanullah Nejah, Nasri Kachouri, Abdennaceur, “MW-LEACH: Low energy adaptive clustering hierarchy approach for WSN,” in IET Wireless Sensor Systems. Vol 10(4), (2020).
- Hicham Qabouche, Aicha Sahel, Abdelmajid Badri, and Ilham El Mourabit, “Novel Reliable and Dynamic Energy-Aware Routing Protocol for Large Scale Wireless Sensor Networks,” in International Journal of Electrical and Computer Engineering, ISSN: 2088-8708, Vol. 12, No. 6, Decemeber 2022, pp. 6440-6448.
- S. Srinivasa Rao, K. Chenna Keshava Reddy and S. Ravi Chand (2022), A Novel Optimization based Energy Efficient and Secured Routing Scheme using SRFIS-CWOSRR for Wireless Sensor Networks. IJEER 10(3), 644-650. DOI: 10.37397/IJEER.100338.
- Mehetre, D.C., Roslin, S.E. & Wagh, S.J, “ Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust,” in Cluster Comput 22 (Suppl 1), 1313–1328 (2019).
- Yadav R. K., & Mahapatra R. P. (2021). Energy aware optimized clustering for hierarchical routing in wireless sensor network. Computer Science Review, 41, 100417
- A. Mehbodniya, S. Bhatia, A. Mashat, M. Elangovan and S. Sengan, “Proportional fairness based energy efficient routing in wireless sensor network,” Computer Systems Science and Engineering, vol. 41, no.3, pp. 1071–1082, 2022.
- Vinodhini R., & Gomathy C. (2021). Fuzzy Based Unequal Clustering and Context-Aware Routing Based on Glow-Worm Swarm Optimization in Wireless Sensor Networks: Forest Fire Detection. Wireless Personal Communications, 118(4), 3501–3522.
- Udhayavani, M., & Chandrasekaran, M. (2019). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: A trust-aware routing framework for wireless sensor networks. Cluster Computing, 22(5), 11919-11927.
- Meng, X., Liu, Y., Gao, X., Zhang, H. (2014). A New Bio-inspired Algorithm: Chicken Swarm Optimization. In: Tan, Y., Shi, Y., Coello, C.A.C. (eds) Advances in Swarm Intelligence. ICSI 2014. Lecture Notes in Computer Science, Vol. 8794. Springer
- Smith, C.L., Zielinski, S.L.: The Startling Intelligence of the Common Chicken. Scientific American 310(2) (2014).
- Gehad Ismail Sayed, Alaa Tharwat and Aboul Ella Hassanien, “Chaotic dragonfly algorithm: an improved metaheuristic algorithm for feature selection” in Journal: Applied Intelligence, Volume 49, Number 1, Page 188 (2019).
- Wang, Zhenwu, Chao Qin, Benting Wan, William Wei Song, and Guoqiang Yang. “An adaptive fuzzy chicken swarm optimization algorithm.” Mathematical Problems in Engineering 2021 (2021): 1-17.
- Atanassov K.T, “Intuitionistic Fuzzy Sets” in Fuzzy Sets Syst. 1986; 20:87–96.
- Xu Z., Yager R.R, “Some Geometric Aggregation Operators Based on Intuitionistic Fuzzy Sets,” in Int. J. Gen. Syst. 2006; 35:417–433.
- Shen F., Ma X., Li Z., Xu Z., Cai D, “ An Extended Intuitionistic Fuzzy TOPSIS Method Based on a New Distance Measure with an Application to Credit Risk Evaluation,” in Inf. Sci. 2018; 428:105–119.