Journal article Open Access

AN ACCURATE IDENTIFICATION OF PACKET DROPPING ATTACKS USING CAT SWARM OPTIMIZATION (CSO) TO ENSURE BETTER INTRUSION DETECTION IN MANET ENVIRONMENT

Niyaz Hussain A M J; G Maria Priscilla


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://zenodo.org/record/5848072">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5848072</dct:identifier>
    <foaf:page rdf:resource="https://zenodo.org/record/5848072"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Niyaz Hussain A M J</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Ph.D. Research Scholar, Department of Computer Science, Sri Ramakrishana College of Arts &amp; Science (Formerly SNR Sons College), Coimbatore, Tamilnadu, India / Assistant Professor, Hindusthan College of Arts and Science, City Campus: Nava India, Coimbatore - 641028, Tamilnadu, India</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>G Maria Priscilla</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Professor &amp; Head, Department of Computer Science, Sri Ramakrishana College of Arts &amp; Science (Formerly SNR Sons College), Nava India, Coimbatore 641006, Tamilnadu, India,</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>AN ACCURATE IDENTIFICATION OF PACKET DROPPING ATTACKS USING CAT SWARM OPTIMIZATION (CSO) TO ENSURE BETTER INTRUSION DETECTION IN MANET ENVIRONMENT</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2020</dct:issued>
    <dcat:keyword>Mobile Ad hoc Network, swarm algorithm, Side Channel Monitoring, packet dropping attack, intrusion detection</dcat:keyword>
    <dct:subject>
      <skos:Concept>
        <skos:prefLabel>2278-3075</skos:prefLabel>
        <skos:inScheme>
          <skos:ConceptScheme>
            <dct:title>issn</dct:title>
          </skos:ConceptScheme>
        </skos:inScheme>
      </skos:Concept>
    </dct:subject>
    <dct:subject>
      <skos:Concept>
        <skos:prefLabel>100.1/ijitee.A4813119119</skos:prefLabel>
        <skos:inScheme>
          <skos:ConceptScheme>
            <dct:title>handle</dct:title>
          </skos:ConceptScheme>
        </skos:inScheme>
      </skos:Concept>
    </dct:subject>
    <schema:sponsor>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Publisher</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </schema:sponsor>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2020-10-30</dct:issued>
    <dct:language rdf:resource="http://publications.europa.eu/resource/authority/language/ENG"/>
    <owl:sameAs rdf:resource="https://zenodo.org/record/5848072"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5848072</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <dct:relation rdf:resource="http://issn.org/resource/ISSN/2278-3075"/>
    <owl:sameAs rdf:resource="https://doi.org/10.35940/ijitee.A4813.1091220"/>
    <dct:description>&lt;p&gt;Mobile Ad hoc Network (MANET), which is comprised of a number of self-organized and battery equipped mobile nodes, is used widely in different applications, like private sectors and military. However, security is a major issue in MANET routing, as the network is prone to attacks. The main objective of intrusion detection system is for categorizing normal and suspicious activities in network. This paper introduce the intrusion detection scheme for establishing the secured path in MANET. For mobile ad hoc networks, swarm optimization approach based novel intrusion detection system is proposed in this paper. The proposed system is based on Cat swarm optimization (CSO) for detecting, one of vey possible attack, i.e. packet dropping attack in mobile ad hoc networks. Also Failure node discovery can be optimized by considering nodes historical information along with the neighbor node information. Before using the swarm optimization for finding sensor node&amp;rsquo;s trust values and for improving provenance data transmission security, an Extend the secure provenance scheme with Side Channel Monitoring &amp;ndash; Information gaining ability (SCM) for detecting packet drop attacks staged by malicious data forwarding nodes is used. It assist in finding presence of selfish nodes as well as packet drop behaviours. With low false positive rate and high true positive rate, packet dropping attacks are detected effectively using proposed technique as shown in simulation results.&lt;/p&gt;</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/>
    <dcat:distribution>
      <dcat:Distribution>
        <dcat:accessURL rdf:resource="https://doi.org/10.35940/ijitee.A4813.1091220"/>
        <dcat:byteSize>367899</dcat:byteSize>
        <dcat:downloadURL rdf:resource="https://zenodo.org/record/5848072/files/A4813119119.pdf"/>
        <dcat:mediaType>application/pdf</dcat:mediaType>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
</rdf:RDF>
34
15
views
downloads
Views 34
Downloads 15
Data volume 5.5 MB
Unique views 28
Unique downloads 14

Share

Cite as