SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & 
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 
TECHNOLOGY (IJCET) 
ISSN 0976 – 6367(Print) 
ISSN 0976 – 6375(Online) 
Volume 5, Issue 7, July (2014), pp. 85-92 
© IAEME: www.iaeme.com/IJCET.asp 
Journal Impact Factor (2014): 8.5328 (Calculated by GISI) 
www.jifactor.com 
IJCET 
© I A E M E 
ENHANCED POWER-AWARE HYBRID INTRUSION DETECTION 
ARCHITECTURE IN AN AD-HOC NETWORK USING MOBILE AGENTS 
Jyoti Attri, Suman Kumari 
1IT Department, International Institute of Information Technology (I2IT), Hinjawadi, Pune, 
Maharastra 
2IT Department, DY Patil College of Engineering, Pune, Maharastra 
85 
ABSTRACT 
Enhanced Power-Aware Hybrid Intrusion Detection Architecture in an Ad-Hoc Network 
Using Mobile Agents describes design and implementation of an energy conscious anamoly based 
co-operative intrusion detection system. This paper addresses the above stated issue by (1) Applying 
mobile agent technology to minimize the network load, conserving bandwidth and to improve 
reactivity. (2)Minimize energy consumption of network monitoring nodes by using Back- 
Propogation Algorithm. This paper presents a new approach to the architecture of IDS in an Ad-Hoc 
Network using Mobile Agents. By using this architecture, we are able to determine which network 
events have to be monitored and where they can be monitored. 
Keywords: Introduction, Security, Characteristics, Routing Protocols, Networks. 
I. INTRODUCTION 
Wireless ad hoc networks are autonomous nodes that communicate with each other in a 
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network 
topology and communicate with each other directly without wireless access point. Wireless networks 
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative 
strategies for network communication. Wireless transmissions are subject to eavesdropping and 
signal jamming. Physical security of each node is important to maintain integral security of the entire 
network.Intrusion detection is one of the key techniques behind protecting a network against 
intruders. An intrusion detection system tries to detect and alert on attempted intrusions into a system 
or network, where an intrusion is considered to be any unauthorized or unwanted activity on that 
system or network. An IDS is a defense system that detects hostile activities in a network and then 
tries to possibly prevent such activities that may compromise system security. IDS may work on a
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 
host level and network level to detect intrusions. An intrusion detection system (IDS) is the software 
and hardware installed to allow intrusion detection. The IDS are described through three fundamental 
components. Information source: It represents the source of information and events to be analyzed by 
the IDS to look for eventual intrusion[3]. It can be either the network traffic or the system logs. 
Analysis method: It defines the method used to analyze the events produced by the information 
source and to decide whether there is intrusion or not. There are basically two approaches: 
1. Misuse detection: Response to intrusions: this component indicates whether the IDS takes actions 
gains intrusions (active IDS) or remains passive, it just report the intrusion (passive IDS). 
2. Anomaly detection: Detection is performed by looking for anomalous behavior and use of the 
computer system. Anomaly detection assumes that intrusive activity is a subset of anomalous 
activity; therefore by detecting the latter it is possible to detect the former[3]. 
Fig 1: BASIC ARCHITECTURE 
In this scheme every node is participates in intrusion detection and response. Every node is 
responsible for detecting signs of intrusion locally and independently by monitoring activities such 
as user and system activities and the communication activities within the radio range. 
This activity normally occurs at the following two locations: 
86 
1. Host – Host based IDS 
2. Network – Network based IDS 
Finally, many intrusion detection systems incorporate multiple features into a single system. 
These systems are known as hybrid systems. These hybrid intrusion detection systems having their 
architecture based on agents which travel throughout the network, provide a comprehensive solution.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 
87 
A. Host based intrusion detection 
Host based intrusion detection system take care of local intrusion detection attempts on each 
node. The host monitoring module includes user level and system level monitoring modules[4]. 
B. Network-based intrusion detection 
Network based intrusion detection system detects intrusion attempts at network level. The 
cluster head has packet monitoring agent, decision making agent and action agent to perform 
network monitoring of packets within the communication range. The modules of the network based 
intrusion detection system[4]. 
II. SECURITY 
Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. No fixed 
infrastructure such as base stations as mobile switching .Nodes within each other radio range 
communicate directly via wireless links while these which are far apart rely on other nodes to relay 
messages. Node mobility causes frequent changes in topology. 
2.1 Security Goals 
1) Availability: Ensures survivability despite Denial Of Service ( DOS ) attacks. On physical and 
media access control layer attacker can use jamming techniques to interfere with communication on 
physical channel. On network layer the attacker can disrupt the routing protocol. On higher layers, 
the attacker could bring down high level services e.g.: key management service. 
2) Confidentiality: Ensures certain information is never disclosed to unauthorized entities. 
3) Integrity: Message being transmitted is never corrupted. 
4) Authentication: Enables a node to ensure the identity of the peer node it is communicating with. 
Without which an attacker would impersonate a node, thus gaining unauthorized access to resource 
and sensitive information and interfering with operation of other nodes. 
5) Non-repudiation Ensures that the origin of a message cannot deny having sent the message. 
2.2 Lack of Centralized Management Facility 
Ad hoc networks do not have a centralized piece of management machinery such as a name 
server, which lead to some vulnerable problems. Now let us discuss this problem in a more detailed 
manner. 
First of all, the absence of centralized management machinery makes the detection of attacks 
a very difficult problem because it is not easy to monitor the traffic in a highly dynamic and large 
scale ad hoc network. It is rather common in the ad hoc network that benign failures, such as path 
breakages, transmission impairments and packet dropping, happen frequently. Therefore, malicious 
failures will be more difficult to detect, especially when adversaries change their attack pattern and 
their attack target in different periods of time. For each of the victims, because it can only observe 
the failure that occurs in itself, this short-time. 
2.3 Restricted Power Supply 
As we all know, due to the mobility of nodes in the ad hoc network, it is common that the 5 
nodes in the ad hoc network will reply on battery as their power supply method. While nodes in the
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 
wired network do not need to consider the power supply problem because they can get electric power 
supply from the outlets, which generally mean that their power supply should be approximately 
infinite; the nodes in the mobile ad hoc network need to consider the restricted battery power, which 
will cause several problems. The first problem that may be caused by the restricted power supply is 
denial of service attacks. Since the adversary knows that the target node is battery restricted, either it 
can continuously send additional packets to the target and ask it routing those additional packets, or 
it can induce the target to be trapped in some kind of time-consuming computations. In this way, the 
battery power of the target node will be exhausted by these meaningless tasks, and thus the target 
node will be out of service to all the benign service requests since it has run out of power. 
88 
2.4 Scalability 
Finally, we need to address the scalability problem when we discuss the vulnerabilities in the 
mobile ad hoc network. Unlike the traditional wired network in that its scale is generally predefined 
when it is designed and will not change much during the use, the scale of the ad hoc network keeps 
changing all the time: because of the mobility of the nodes in the mobile ad hoc network, you can 
hardly predict how many nodes there will be in the network in the future. As a result, the protocols 
and services that are applied to the ad hoc network such as routing protocol and key management 
service should be compatible to the continuously changing scale of the ad hoc network, which may 
range from decades of nodes to hundreds of nodes, or even thousands of nodes. In other words, these 
protocols and services need to scale 
III. ROUTING PROTOCOLS 
Routing protocols are classified into two types based on their Properties. 
 Proactive Routing Protocols 
 Reactive Routing protocols 
3.1 Table Driven Routing Protocols (Proactive) 
In proactive or table-driven routing protocols, each node continuously maintains up-to-date 
routes to every other node in the network. Routing information is periodically transmitted throughout 
the network in order to maintain routing table consistency. The areas in which they differ are the 
number of necessary routing-related tables and the methods by which changes in network structure 
are broadcast. The proactive IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010 125 
protocols are not suitable for larger networks, as they need to maintain node entries for each and 
every node in the routing table of every node[6]. 
3.2 On-Demand routing Protocols (Reactive) 
With on-demand protocols, if a source node requires a route to the destination for which it 
does not have route information, it initiates a route discovery process which goes from one node to 
the other until it reaches to the destination or an intermediate node has a route to the destination. If a 
node wants to send a packet to another node then this protocol searches for the route in an on-demand 
manner and establishes the connection in order to transmit and receive the packet. The route 
discovery usually occurs by flooding the route request packets throughout the network[6].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 
Fig 2: Routing Architecture 
89 
IV. PROBLEM 
Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks using Mobile Agents 
describes design and implementation of an energy conscious anomaly based co operative intrusion 
detection system for wireless ad hoc networks using mobile agent technology. The developed system 
has two subsystems, host based and network based intrusion detection system. IBM’s Aglet is used 
as the base agent architecture to create mobile agents for intrusion detection task. Three major agent 
categories used are namely monitoring agent, decision making agent and action agent. Host based 
intrusion detection system take care of local intrusion detection on each node. The host monitoring 
agent monitors user level and system level activities for anomaly detection. Network based intrusion 
detection system takes care of co operative intrusion detection at network level. The cluster heads are 
identified by two techniques based on i) connectivity index ii) power aware selection algorithm. The 
first method considers number of reachable nodes is the basis for cluster head selection. The node 
with highest connectivity is selected as cluster head. In second method power level of the nodes is 
considered for cluster head selection in order to minimize energy consumption. 
The mobile agents are used to detect attacks on the network level. The mobile agent itself is 
the target of the attackers. 
V. SOLUTION 
As the problem showing that mobile agents are also the target of the attackers. This problem 
is only solved by using one of the best learning algorithm(BACK PROPAGATION) to detect and 
prevent multiple attacks.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 
Fig 3: Back Propagation Learning Algorithm 
90 
VI. PROPOSED WORK 
A. Proposed Architecture
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 
91 
B. Characteristics 
Our proposed IDS architecture has several key properties distinguishing it from other IDS 
architectures: 
1) Seamless Security Level Adjustment 
In general, various application environments have different security requirements for their 
underlying communication networks. MANETs, for example, are required to be protected with 
higher security level when they are deployed in hostile and harsh environment (i.e. military 
applications) where network’s availability and security are the first things to consider. On the other 
hand, the requirement of communication security in civilian applications is comparatively low. In 
some cases, it is desirable that security level of MANETs provided by IDSs should be adjusted 
elastically and seamlessly corresponding to application scenario transformation. For instance, one 
military group is carrying out a rescue operation in the rear area of battlefield that is a comparatively 
non-hostile environment. In this case, MANET is protected by IDS only with ordinary security level. 
At this moment, if this group is dispatched to the battlefront for an emergency mission, the IDS 
should be configured to provide higher security level. 
2) Attack tolerance 
In addition to protecting communication networks, IDS should defend itself against attacks. 
However, current IDSs in MANETs do not address this issue effectively: hierarchical IDS 
architectures possess the SPF security flaw, and flat IDS architectures address this problem at the 
cost of complex cooperative mechanisms leading to depletion of resources. Our proposed 
architecture solves this problem from a new aspect: rangers keep roaming in the network, and their 
non-predictive mobility will cloak them from attackers’ sniffing or orientation. Therefore, it is 
reasonable to believe that rangers could avoid attacks since it is difficult for attackers to capture (or 
find) them. Furthermore, rangers are designed in a flexible and modular manner so that each 
individual ranger might use different ID algorithms when it was dispatched. This is helpful to avoid 
the following situation: in a uniform IDS agent configuration environment where all IDS agents 
perform the same ID algorithms, an adversary who is able to find a way to avoid detection at one 
agent, will exist in the network without being detected by other agents. Hence, in our architecture, 
even if one ranger is compromised, other surviving rangers will inform each other to isolate the 
compromised ranger and exclude it. More importantly, the remaining rangers will likely detect the 
intruder and gather knowledge of the detection schemes which have been compromised. 
VII. CONCLUSION 
In this paper we have proposed a new architecture that use the concept of Power-Aware 
Hybrid Intrusion Detection Architecture and learning algorithm to provide better detection and 
prevent the MOBILE AGENTS from the the attacks of Attackers. They learn from their experiences 
and provide better detection. 
VIII. FUTURE WORK 
Some Other learning algorithms can also be used for better performance of an architecture in 
combination with Power-Aware Hybrid Intrusion Detection Architecture that provides better result.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 
92 
IX. REFERENCES 
1. T.Srinivasan, V. Mahadevan, A. Meyyappan, A.Manikandan, M.Nivedita, N.Pavithra, 
“Hybrid Agents for Power Aware Intrusion Detection in Highly Mobile Ad-hoc networks”, 
International Conference on Systems and Network Communication (ICSNC’06) October 
2006. 
2. Zeng-Quan Wang, Hui-Qiang Wang, Qian Zhao, Rui-Jie Zhang, “Research on Intrusion 
Detection System”, Proceedings of the 5th International Conference on Machine Learning and 
Cybernetics, Dalian, 13-16 August 2006. 
3. Ranger, a Novel Intrusion Detection System Architecture for Mobile Ad Hoc Networks, 
Yinghua Guo Institute for Telecommunications Research University of South Australia 
Adelaide, Australia Yinghua.Guo@postgrads.unisa.edu.au, Steven Gordon Institute for 
Telecommunications Research University of South Australia Adelaide, Australia 
Steven.Gordon@unisa.edu.au 
4. Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks using Mobile Agents 
Praveen Kumar Madala PG Scholar, Dept of CSE Saveetha Engineering College, Chennai, 
Tamil Nadu, India 
5. Zone-based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks Il-Yong 
Kim, Yoo-Sung Kim, and Ki-Chang Kim. 
6. Enhanced Intrusion Detection Systems in Ad Hoc Networks using a Grid Based Agnostic 
Middleware Pasquale Donadio 
Alcatel Lucent Italia VIA BOSCO PRIMO 84091 BATTIPAGLIA – ITALY +39 0828 398 
694 pasquale.donadio@alcatellucent It Antonio Cimmino Alcatel Lucent Italia VIA BOSCO 
PRIMO 84091 BATTIPAGLIA – ITALY +39 0828 398 405 antonio.cimmino@alcatellucent. 
7. Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in 
MANETs D.Srinivasa Rao Department of Computer Applications PG College, 
Srikakulam, Andhra Pradesh, India. 
8. Security Issues in Mobile Ad Hoc Networks - A Survey Wenjia Li and Anupam Joshi 
Department of Computer Science and Electrical Engineering University of Maryland, 
Baltimore County. 
9. Abdulrahman Hijari, Nidal Naseer, “Using mobile agents for intrusion detection in wireless 
ad-hoc networks”, Wireless and Optical Communications Networks WOCN 2005, Second 
IFIP International Conference on 6-8 March 2005, pp 362-366. 
10. Noria Foukia, “IDReAM: Intrusion detection and response executed with agent mobility 
architecture and implementation”, AAMAS’05, July 25-29, 2005, Utrecht, Netherlands. ACM. 
11. A. Mishra, k. Nadkarni, and A. Patcha, “Intrusion detection in wireless ad-hoc networks,” 
IEEE Wireless Communications Vol. 11, Issue 1, pp. 48-60, Feb. 2004. 
12. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr.K.Anita Sheela, “Energy Efficient 
Intrusion Detection System for WSN”, International Journal of Electronics and 
Communication Engineering Technology (IJECET), Volume 3, Issue 3, 2012, pp. 246 - 250, 
ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 
13. Shraddha Chaurasia and Lalit Dole, “Secure Masid: Secure Multi-Agent System for Intrusion 
Detection”, International Journal of Computer Engineering  Technology (IJCET), Volume 4, 
Issue 1, 2013, pp. 392 - 397, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 
14. S. B. Patil, S. M. Deshmukh, Dr. Preeti Patil and Nitin Chavan, “Intrusion Detection 
Probability Identification in Homogeneous System of Wireless Sensor Network”, International 
Journal of Computer Engineering  Technology (IJCET), Volume 3, Issue 2, 2012, 
pp. 12 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Mais conteúdo relacionado

Mais procurados

02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackRashi Dhagat
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networkseSAT Journals
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...IRJET Journal
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters usingeSAT Publishing House
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 

Mais procurados (19)

02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
574 501-507
574 501-507574 501-507
574 501-507
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
331 340
331 340331 340
331 340
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networks
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 

Destaque

Reference Letter Barbara Praglowska
Reference Letter Barbara PraglowskaReference Letter Barbara Praglowska
Reference Letter Barbara PraglowskaBarbara Praglowska
 
01 adriano-cfm-genética visão técnica na compra-beefpoint_jun12
01 adriano-cfm-genética visão técnica na compra-beefpoint_jun1201 adriano-cfm-genética visão técnica na compra-beefpoint_jun12
01 adriano-cfm-genética visão técnica na compra-beefpoint_jun12AgroTalento
 
[Mercado Pecuário] Principais Notícias 10/jan/12
[Mercado Pecuário] Principais Notícias 10/jan/12[Mercado Pecuário] Principais Notícias 10/jan/12
[Mercado Pecuário] Principais Notícias 10/jan/12AgroTalento
 
Presentación dhtic
Presentación dhticPresentación dhtic
Presentación dhticCarlos
 
Bienaventuranzas de la navidad 2011
Bienaventuranzas de la navidad 2011Bienaventuranzas de la navidad 2011
Bienaventuranzas de la navidad 2011xaquintana
 
17 leandro-bovo-palestra opções beefpoint 170512
17 leandro-bovo-palestra opções beefpoint 17051217 leandro-bovo-palestra opções beefpoint 170512
17 leandro-bovo-palestra opções beefpoint 170512AgroTalento
 
Recomandation letter Director assitant
Recomandation letter Director assitantRecomandation letter Director assitant
Recomandation letter Director assitantCyril Gardin
 
SECREÇÃO GH É MEDIADA POR 2 HORMÔNIOS HIPOTALÂMICOS;GHRH E SOMATOSTATINA
SECREÇÃO GH É MEDIADA POR 2 HORMÔNIOS HIPOTALÂMICOS;GHRH E SOMATOSTATINA SECREÇÃO GH É MEDIADA POR 2 HORMÔNIOS HIPOTALÂMICOS;GHRH E SOMATOSTATINA
SECREÇÃO GH É MEDIADA POR 2 HORMÔNIOS HIPOTALÂMICOS;GHRH E SOMATOSTATINA Van Der Häägen Brazil
 
Crescimento Baixa Estatura (altura) Criança, Infantil, Juvenil Manejo Biopsic...
Crescimento Baixa Estatura (altura) Criança, Infantil, Juvenil Manejo Biopsic...Crescimento Baixa Estatura (altura) Criança, Infantil, Juvenil Manejo Biopsic...
Crescimento Baixa Estatura (altura) Criança, Infantil, Juvenil Manejo Biopsic...Van Der Häägen Brazil
 
Mayo con el papa francisco
Mayo con el papa franciscoMayo con el papa francisco
Mayo con el papa franciscoxaquintana
 
BAIXA ESTATURA E CRESCIMENTO LINEAR: UM LADO POSITIVO PARA O GH HUMANO
BAIXA ESTATURA E CRESCIMENTO LINEAR: UM LADO POSITIVO PARA O GH HUMANOBAIXA ESTATURA E CRESCIMENTO LINEAR: UM LADO POSITIVO PARA O GH HUMANO
BAIXA ESTATURA E CRESCIMENTO LINEAR: UM LADO POSITIVO PARA O GH HUMANOVan Der Häägen Brazil
 
InvestigacióN CientíFica
InvestigacióN CientíFicaInvestigacióN CientíFica
InvestigacióN CientíFicaguestbe9840
 
POSTER_1_Graduate Engineer_Oct.2016 v1
POSTER_1_Graduate Engineer_Oct.2016 v1POSTER_1_Graduate Engineer_Oct.2016 v1
POSTER_1_Graduate Engineer_Oct.2016 v1Jessica Hassall
 
Guilcapi mis imagenes
Guilcapi mis imagenesGuilcapi mis imagenes
Guilcapi mis imagenesLuis guilcapi
 
ESTATURA LONGITUDINAL OU LINEAR BAIXA: FATORES DE CRESCIMENTO INSULINA SÍMILE...
ESTATURA LONGITUDINAL OU LINEAR BAIXA: FATORES DE CRESCIMENTO INSULINA SÍMILE...ESTATURA LONGITUDINAL OU LINEAR BAIXA: FATORES DE CRESCIMENTO INSULINA SÍMILE...
ESTATURA LONGITUDINAL OU LINEAR BAIXA: FATORES DE CRESCIMENTO INSULINA SÍMILE...Van Der Häägen Brazil
 

Destaque (20)

Reference Letter Barbara Praglowska
Reference Letter Barbara PraglowskaReference Letter Barbara Praglowska
Reference Letter Barbara Praglowska
 
01 adriano-cfm-genética visão técnica na compra-beefpoint_jun12
01 adriano-cfm-genética visão técnica na compra-beefpoint_jun1201 adriano-cfm-genética visão técnica na compra-beefpoint_jun12
01 adriano-cfm-genética visão técnica na compra-beefpoint_jun12
 
SAPM notes 4TH SEM
SAPM  notes 4TH SEM SAPM  notes 4TH SEM
SAPM notes 4TH SEM
 
[Mercado Pecuário] Principais Notícias 10/jan/12
[Mercado Pecuário] Principais Notícias 10/jan/12[Mercado Pecuário] Principais Notícias 10/jan/12
[Mercado Pecuário] Principais Notícias 10/jan/12
 
Presentación dhtic
Presentación dhticPresentación dhtic
Presentación dhtic
 
Bienaventuranzas de la navidad 2011
Bienaventuranzas de la navidad 2011Bienaventuranzas de la navidad 2011
Bienaventuranzas de la navidad 2011
 
17 leandro-bovo-palestra opções beefpoint 170512
17 leandro-bovo-palestra opções beefpoint 17051217 leandro-bovo-palestra opções beefpoint 170512
17 leandro-bovo-palestra opções beefpoint 170512
 
Green marketing
Green marketingGreen marketing
Green marketing
 
Ladakh trip
Ladakh tripLadakh trip
Ladakh trip
 
Recomandation letter Director assitant
Recomandation letter Director assitantRecomandation letter Director assitant
Recomandation letter Director assitant
 
SECREÇÃO GH É MEDIADA POR 2 HORMÔNIOS HIPOTALÂMICOS;GHRH E SOMATOSTATINA
SECREÇÃO GH É MEDIADA POR 2 HORMÔNIOS HIPOTALÂMICOS;GHRH E SOMATOSTATINA SECREÇÃO GH É MEDIADA POR 2 HORMÔNIOS HIPOTALÂMICOS;GHRH E SOMATOSTATINA
SECREÇÃO GH É MEDIADA POR 2 HORMÔNIOS HIPOTALÂMICOS;GHRH E SOMATOSTATINA
 
Crescimento Baixa Estatura (altura) Criança, Infantil, Juvenil Manejo Biopsic...
Crescimento Baixa Estatura (altura) Criança, Infantil, Juvenil Manejo Biopsic...Crescimento Baixa Estatura (altura) Criança, Infantil, Juvenil Manejo Biopsic...
Crescimento Baixa Estatura (altura) Criança, Infantil, Juvenil Manejo Biopsic...
 
Mayo con el papa francisco
Mayo con el papa franciscoMayo con el papa francisco
Mayo con el papa francisco
 
BAIXA ESTATURA E CRESCIMENTO LINEAR: UM LADO POSITIVO PARA O GH HUMANO
BAIXA ESTATURA E CRESCIMENTO LINEAR: UM LADO POSITIVO PARA O GH HUMANOBAIXA ESTATURA E CRESCIMENTO LINEAR: UM LADO POSITIVO PARA O GH HUMANO
BAIXA ESTATURA E CRESCIMENTO LINEAR: UM LADO POSITIVO PARA O GH HUMANO
 
InvestigacióN CientíFica
InvestigacióN CientíFicaInvestigacióN CientíFica
InvestigacióN CientíFica
 
POSTER_1_Graduate Engineer_Oct.2016 v1
POSTER_1_Graduate Engineer_Oct.2016 v1POSTER_1_Graduate Engineer_Oct.2016 v1
POSTER_1_Graduate Engineer_Oct.2016 v1
 
Guilcapi mis imagenes
Guilcapi mis imagenesGuilcapi mis imagenes
Guilcapi mis imagenes
 
Summerwork
Summerwork Summerwork
Summerwork
 
2016_CV_Tahereh Fathi Najafi
2016_CV_Tahereh Fathi Najafi2016_CV_Tahereh Fathi Najafi
2016_CV_Tahereh Fathi Najafi
 
ESTATURA LONGITUDINAL OU LINEAR BAIXA: FATORES DE CRESCIMENTO INSULINA SÍMILE...
ESTATURA LONGITUDINAL OU LINEAR BAIXA: FATORES DE CRESCIMENTO INSULINA SÍMILE...ESTATURA LONGITUDINAL OU LINEAR BAIXA: FATORES DE CRESCIMENTO INSULINA SÍMILE...
ESTATURA LONGITUDINAL OU LINEAR BAIXA: FATORES DE CRESCIMENTO INSULINA SÍMILE...
 

Semelhante a 50120140507012

Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETIJMTST Journal
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 

Semelhante a 50120140507012 (20)

Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
M026075079
M026075079M026075079
M026075079
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
40120140507001
4012014050700140120140507001
40120140507001
 
40120140507001
4012014050700140120140507001
40120140507001
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
 
40120140502001
4012014050200140120140502001
40120140502001
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

50120140507012

  • 1. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E ENHANCED POWER-AWARE HYBRID INTRUSION DETECTION ARCHITECTURE IN AN AD-HOC NETWORK USING MOBILE AGENTS Jyoti Attri, Suman Kumari 1IT Department, International Institute of Information Technology (I2IT), Hinjawadi, Pune, Maharastra 2IT Department, DY Patil College of Engineering, Pune, Maharastra 85 ABSTRACT Enhanced Power-Aware Hybrid Intrusion Detection Architecture in an Ad-Hoc Network Using Mobile Agents describes design and implementation of an energy conscious anamoly based co-operative intrusion detection system. This paper addresses the above stated issue by (1) Applying mobile agent technology to minimize the network load, conserving bandwidth and to improve reactivity. (2)Minimize energy consumption of network monitoring nodes by using Back- Propogation Algorithm. This paper presents a new approach to the architecture of IDS in an Ad-Hoc Network using Mobile Agents. By using this architecture, we are able to determine which network events have to be monitored and where they can be monitored. Keywords: Introduction, Security, Characteristics, Routing Protocols, Networks. I. INTRODUCTION Wireless ad hoc networks are autonomous nodes that communicate with each other in a decentralized manner through multi hop radio network. Wireless nodes form a dynamic network topology and communicate with each other directly without wireless access point. Wireless networks are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative strategies for network communication. Wireless transmissions are subject to eavesdropping and signal jamming. Physical security of each node is important to maintain integral security of the entire network.Intrusion detection is one of the key techniques behind protecting a network against intruders. An intrusion detection system tries to detect and alert on attempted intrusions into a system or network, where an intrusion is considered to be any unauthorized or unwanted activity on that system or network. An IDS is a defense system that detects hostile activities in a network and then tries to possibly prevent such activities that may compromise system security. IDS may work on a
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME host level and network level to detect intrusions. An intrusion detection system (IDS) is the software and hardware installed to allow intrusion detection. The IDS are described through three fundamental components. Information source: It represents the source of information and events to be analyzed by the IDS to look for eventual intrusion[3]. It can be either the network traffic or the system logs. Analysis method: It defines the method used to analyze the events produced by the information source and to decide whether there is intrusion or not. There are basically two approaches: 1. Misuse detection: Response to intrusions: this component indicates whether the IDS takes actions gains intrusions (active IDS) or remains passive, it just report the intrusion (passive IDS). 2. Anomaly detection: Detection is performed by looking for anomalous behavior and use of the computer system. Anomaly detection assumes that intrusive activity is a subset of anomalous activity; therefore by detecting the latter it is possible to detect the former[3]. Fig 1: BASIC ARCHITECTURE In this scheme every node is participates in intrusion detection and response. Every node is responsible for detecting signs of intrusion locally and independently by monitoring activities such as user and system activities and the communication activities within the radio range. This activity normally occurs at the following two locations: 86 1. Host – Host based IDS 2. Network – Network based IDS Finally, many intrusion detection systems incorporate multiple features into a single system. These systems are known as hybrid systems. These hybrid intrusion detection systems having their architecture based on agents which travel throughout the network, provide a comprehensive solution.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 87 A. Host based intrusion detection Host based intrusion detection system take care of local intrusion detection attempts on each node. The host monitoring module includes user level and system level monitoring modules[4]. B. Network-based intrusion detection Network based intrusion detection system detects intrusion attempts at network level. The cluster head has packet monitoring agent, decision making agent and action agent to perform network monitoring of packets within the communication range. The modules of the network based intrusion detection system[4]. II. SECURITY Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. No fixed infrastructure such as base stations as mobile switching .Nodes within each other radio range communicate directly via wireless links while these which are far apart rely on other nodes to relay messages. Node mobility causes frequent changes in topology. 2.1 Security Goals 1) Availability: Ensures survivability despite Denial Of Service ( DOS ) attacks. On physical and media access control layer attacker can use jamming techniques to interfere with communication on physical channel. On network layer the attacker can disrupt the routing protocol. On higher layers, the attacker could bring down high level services e.g.: key management service. 2) Confidentiality: Ensures certain information is never disclosed to unauthorized entities. 3) Integrity: Message being transmitted is never corrupted. 4) Authentication: Enables a node to ensure the identity of the peer node it is communicating with. Without which an attacker would impersonate a node, thus gaining unauthorized access to resource and sensitive information and interfering with operation of other nodes. 5) Non-repudiation Ensures that the origin of a message cannot deny having sent the message. 2.2 Lack of Centralized Management Facility Ad hoc networks do not have a centralized piece of management machinery such as a name server, which lead to some vulnerable problems. Now let us discuss this problem in a more detailed manner. First of all, the absence of centralized management machinery makes the detection of attacks a very difficult problem because it is not easy to monitor the traffic in a highly dynamic and large scale ad hoc network. It is rather common in the ad hoc network that benign failures, such as path breakages, transmission impairments and packet dropping, happen frequently. Therefore, malicious failures will be more difficult to detect, especially when adversaries change their attack pattern and their attack target in different periods of time. For each of the victims, because it can only observe the failure that occurs in itself, this short-time. 2.3 Restricted Power Supply As we all know, due to the mobility of nodes in the ad hoc network, it is common that the 5 nodes in the ad hoc network will reply on battery as their power supply method. While nodes in the
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME wired network do not need to consider the power supply problem because they can get electric power supply from the outlets, which generally mean that their power supply should be approximately infinite; the nodes in the mobile ad hoc network need to consider the restricted battery power, which will cause several problems. The first problem that may be caused by the restricted power supply is denial of service attacks. Since the adversary knows that the target node is battery restricted, either it can continuously send additional packets to the target and ask it routing those additional packets, or it can induce the target to be trapped in some kind of time-consuming computations. In this way, the battery power of the target node will be exhausted by these meaningless tasks, and thus the target node will be out of service to all the benign service requests since it has run out of power. 88 2.4 Scalability Finally, we need to address the scalability problem when we discuss the vulnerabilities in the mobile ad hoc network. Unlike the traditional wired network in that its scale is generally predefined when it is designed and will not change much during the use, the scale of the ad hoc network keeps changing all the time: because of the mobility of the nodes in the mobile ad hoc network, you can hardly predict how many nodes there will be in the network in the future. As a result, the protocols and services that are applied to the ad hoc network such as routing protocol and key management service should be compatible to the continuously changing scale of the ad hoc network, which may range from decades of nodes to hundreds of nodes, or even thousands of nodes. In other words, these protocols and services need to scale III. ROUTING PROTOCOLS Routing protocols are classified into two types based on their Properties. Proactive Routing Protocols Reactive Routing protocols 3.1 Table Driven Routing Protocols (Proactive) In proactive or table-driven routing protocols, each node continuously maintains up-to-date routes to every other node in the network. Routing information is periodically transmitted throughout the network in order to maintain routing table consistency. The areas in which they differ are the number of necessary routing-related tables and the methods by which changes in network structure are broadcast. The proactive IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010 125 protocols are not suitable for larger networks, as they need to maintain node entries for each and every node in the routing table of every node[6]. 3.2 On-Demand routing Protocols (Reactive) With on-demand protocols, if a source node requires a route to the destination for which it does not have route information, it initiates a route discovery process which goes from one node to the other until it reaches to the destination or an intermediate node has a route to the destination. If a node wants to send a packet to another node then this protocol searches for the route in an on-demand manner and establishes the connection in order to transmit and receive the packet. The route discovery usually occurs by flooding the route request packets throughout the network[6].
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME Fig 2: Routing Architecture 89 IV. PROBLEM Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks using Mobile Agents describes design and implementation of an energy conscious anomaly based co operative intrusion detection system for wireless ad hoc networks using mobile agent technology. The developed system has two subsystems, host based and network based intrusion detection system. IBM’s Aglet is used as the base agent architecture to create mobile agents for intrusion detection task. Three major agent categories used are namely monitoring agent, decision making agent and action agent. Host based intrusion detection system take care of local intrusion detection on each node. The host monitoring agent monitors user level and system level activities for anomaly detection. Network based intrusion detection system takes care of co operative intrusion detection at network level. The cluster heads are identified by two techniques based on i) connectivity index ii) power aware selection algorithm. The first method considers number of reachable nodes is the basis for cluster head selection. The node with highest connectivity is selected as cluster head. In second method power level of the nodes is considered for cluster head selection in order to minimize energy consumption. The mobile agents are used to detect attacks on the network level. The mobile agent itself is the target of the attackers. V. SOLUTION As the problem showing that mobile agents are also the target of the attackers. This problem is only solved by using one of the best learning algorithm(BACK PROPAGATION) to detect and prevent multiple attacks.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME Fig 3: Back Propagation Learning Algorithm 90 VI. PROPOSED WORK A. Proposed Architecture
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 91 B. Characteristics Our proposed IDS architecture has several key properties distinguishing it from other IDS architectures: 1) Seamless Security Level Adjustment In general, various application environments have different security requirements for their underlying communication networks. MANETs, for example, are required to be protected with higher security level when they are deployed in hostile and harsh environment (i.e. military applications) where network’s availability and security are the first things to consider. On the other hand, the requirement of communication security in civilian applications is comparatively low. In some cases, it is desirable that security level of MANETs provided by IDSs should be adjusted elastically and seamlessly corresponding to application scenario transformation. For instance, one military group is carrying out a rescue operation in the rear area of battlefield that is a comparatively non-hostile environment. In this case, MANET is protected by IDS only with ordinary security level. At this moment, if this group is dispatched to the battlefront for an emergency mission, the IDS should be configured to provide higher security level. 2) Attack tolerance In addition to protecting communication networks, IDS should defend itself against attacks. However, current IDSs in MANETs do not address this issue effectively: hierarchical IDS architectures possess the SPF security flaw, and flat IDS architectures address this problem at the cost of complex cooperative mechanisms leading to depletion of resources. Our proposed architecture solves this problem from a new aspect: rangers keep roaming in the network, and their non-predictive mobility will cloak them from attackers’ sniffing or orientation. Therefore, it is reasonable to believe that rangers could avoid attacks since it is difficult for attackers to capture (or find) them. Furthermore, rangers are designed in a flexible and modular manner so that each individual ranger might use different ID algorithms when it was dispatched. This is helpful to avoid the following situation: in a uniform IDS agent configuration environment where all IDS agents perform the same ID algorithms, an adversary who is able to find a way to avoid detection at one agent, will exist in the network without being detected by other agents. Hence, in our architecture, even if one ranger is compromised, other surviving rangers will inform each other to isolate the compromised ranger and exclude it. More importantly, the remaining rangers will likely detect the intruder and gather knowledge of the detection schemes which have been compromised. VII. CONCLUSION In this paper we have proposed a new architecture that use the concept of Power-Aware Hybrid Intrusion Detection Architecture and learning algorithm to provide better detection and prevent the MOBILE AGENTS from the the attacks of Attackers. They learn from their experiences and provide better detection. VIII. FUTURE WORK Some Other learning algorithms can also be used for better performance of an architecture in combination with Power-Aware Hybrid Intrusion Detection Architecture that provides better result.
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 85-92 © IAEME 92 IX. REFERENCES 1. T.Srinivasan, V. Mahadevan, A. Meyyappan, A.Manikandan, M.Nivedita, N.Pavithra, “Hybrid Agents for Power Aware Intrusion Detection in Highly Mobile Ad-hoc networks”, International Conference on Systems and Network Communication (ICSNC’06) October 2006. 2. Zeng-Quan Wang, Hui-Qiang Wang, Qian Zhao, Rui-Jie Zhang, “Research on Intrusion Detection System”, Proceedings of the 5th International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006. 3. Ranger, a Novel Intrusion Detection System Architecture for Mobile Ad Hoc Networks, Yinghua Guo Institute for Telecommunications Research University of South Australia Adelaide, Australia Yinghua.Guo@postgrads.unisa.edu.au, Steven Gordon Institute for Telecommunications Research University of South Australia Adelaide, Australia Steven.Gordon@unisa.edu.au 4. Power-Aware Hybrid Intrusion Detection in Wireless Adhoc Networks using Mobile Agents Praveen Kumar Madala PG Scholar, Dept of CSE Saveetha Engineering College, Chennai, Tamil Nadu, India 5. Zone-based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks Il-Yong Kim, Yoo-Sung Kim, and Ki-Chang Kim. 6. Enhanced Intrusion Detection Systems in Ad Hoc Networks using a Grid Based Agnostic Middleware Pasquale Donadio Alcatel Lucent Italia VIA BOSCO PRIMO 84091 BATTIPAGLIA – ITALY +39 0828 398 694 pasquale.donadio@alcatellucent It Antonio Cimmino Alcatel Lucent Italia VIA BOSCO PRIMO 84091 BATTIPAGLIA – ITALY +39 0828 398 405 antonio.cimmino@alcatellucent. 7. Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs D.Srinivasa Rao Department of Computer Applications PG College, Srikakulam, Andhra Pradesh, India. 8. Security Issues in Mobile Ad Hoc Networks - A Survey Wenjia Li and Anupam Joshi Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County. 9. Abdulrahman Hijari, Nidal Naseer, “Using mobile agents for intrusion detection in wireless ad-hoc networks”, Wireless and Optical Communications Networks WOCN 2005, Second IFIP International Conference on 6-8 March 2005, pp 362-366. 10. Noria Foukia, “IDReAM: Intrusion detection and response executed with agent mobility architecture and implementation”, AAMAS’05, July 25-29, 2005, Utrecht, Netherlands. ACM. 11. A. Mishra, k. Nadkarni, and A. Patcha, “Intrusion detection in wireless ad-hoc networks,” IEEE Wireless Communications Vol. 11, Issue 1, pp. 48-60, Feb. 2004. 12. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr.K.Anita Sheela, “Energy Efficient Intrusion Detection System for WSN”, International Journal of Electronics and Communication Engineering Technology (IJECET), Volume 3, Issue 3, 2012, pp. 246 - 250, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 13. Shraddha Chaurasia and Lalit Dole, “Secure Masid: Secure Multi-Agent System for Intrusion Detection”, International Journal of Computer Engineering Technology (IJCET), Volume 4, Issue 1, 2013, pp. 392 - 397, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 14. S. B. Patil, S. M. Deshmukh, Dr. Preeti Patil and Nitin Chavan, “Intrusion Detection Probability Identification in Homogeneous System of Wireless Sensor Network”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 2, 2012, pp. 12 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.