The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the communication network. In this paper, an Intrusion Detection System based on the framework of graph theory is proposed. A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node. The algorithm performs the layer-wise analysis to extract the vulnerable nodes and ultimately the attacked node(s)....
Intrusion Detection System (IDS) is a system that provides a layer of security to an organization’s ...
The rapid proliferation of wireless networks and mobile computing applications has changed the lands...
We study efficient and lightweight Intrusion Detection Systems for Ad-Hoc networks via the prism of ...
Wireless sensor networks (WSNs) are made up of a large number of sensor nodes which collect data and...
In society today, public and personal communication are often carried out through wireless technolog...
Smart grid systems enhanced the capability of traditional power networks while being vulnerable to d...
As advances in the networking technology help to connect distant corners of the globe and as the Int...
Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny se...
Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing...
Abstract. As 5G technology is widely implemented on a global scale, both the complexity of networks ...
The rapid advances in the internet and communication fields have resulted in ahuge increase in the n...
The technology of Wireless Sensor Networks (WSNs) has become most significant in present day. WSNs a...
The 5G networks are very important to support complex application byconnecting different types of ma...
Transformation of the traditional power grid into a smart grid hosts an array of vulnerabilities ass...
Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and...
Intrusion Detection System (IDS) is a system that provides a layer of security to an organization’s ...
The rapid proliferation of wireless networks and mobile computing applications has changed the lands...
We study efficient and lightweight Intrusion Detection Systems for Ad-Hoc networks via the prism of ...
Wireless sensor networks (WSNs) are made up of a large number of sensor nodes which collect data and...
In society today, public and personal communication are often carried out through wireless technolog...
Smart grid systems enhanced the capability of traditional power networks while being vulnerable to d...
As advances in the networking technology help to connect distant corners of the globe and as the Int...
Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny se...
Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing...
Abstract. As 5G technology is widely implemented on a global scale, both the complexity of networks ...
The rapid advances in the internet and communication fields have resulted in ahuge increase in the n...
The technology of Wireless Sensor Networks (WSNs) has become most significant in present day. WSNs a...
The 5G networks are very important to support complex application byconnecting different types of ma...
Transformation of the traditional power grid into a smart grid hosts an array of vulnerabilities ass...
Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and...
Intrusion Detection System (IDS) is a system that provides a layer of security to an organization’s ...
The rapid proliferation of wireless networks and mobile computing applications has changed the lands...
We study efficient and lightweight Intrusion Detection Systems for Ad-Hoc networks via the prism of ...