2019 4th International Conference on Information Systems and Computer Networks (ISCON) 2019
DOI: 10.1109/iscon47742.2019.9036288
|View full text |Cite
|
Sign up to set email alerts
|

A Security Model for Intrusion Detection and Prevention over Wireless Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Figure 5, demonstrates the detection of various network attacks and compares them with state-of-the-art methods. Figure 5, describes the proposed model obtains higher results than IDS based methods such as (3,5,11) (5) in large WSNs. https://www.indjst.org/ According to Figure 5 and Figure 6, the proposed lightweight key generation method required minimum time and energy for data encryption and decryption.…”
Section: Resultsmentioning
confidence: 97%
See 2 more Smart Citations
“…Figure 5, demonstrates the detection of various network attacks and compares them with state-of-the-art methods. Figure 5, describes the proposed model obtains higher results than IDS based methods such as (3,5,11) (5) in large WSNs. https://www.indjst.org/ According to Figure 5 and Figure 6, the proposed lightweight key generation method required minimum time and energy for data encryption and decryption.…”
Section: Resultsmentioning
confidence: 97%
“…Standard and Rivest Shamir Adleman algorithm: (10) 1 to 10 23 64 Tropea M. (12) 1 to 12 25 and 46 64 and 128 Anurag Yadav (11) 1 to 8 21 and 39 64 and 128 Zhou L. (9) 1 to 5 9 and 17 32 and 64 Lightweight (proposed) 1 to 5, 10 8, 13 and 34 32,64 and 128…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Any action endeavoring to weak these parameters or to sidestep the security schemes of a network can be viewed as a network intrusion. An IDS is a sort of security management framework that is used to identify intrusion in the network and is a basic section of network security frameworks these days [1][2][3]. An IDS ordinarily checks all incoming as well as outgoing data of a specific network to decide if every packet has indications of an intrusion.…”
Section: Introductionmentioning
confidence: 99%