Loading...
  • Home
  • Search Results
2087-2088 of 4327 Papers

CELLULAR CROSS-LAYER INTRUSION DETECTION AND RESPONSE

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION PROCESSING AND COMMUNICATION TECHNOLOGY
Author(s): MD. MOTAHARUL ISLAM , MOHAMMAD RAIHAN KABIR , RIFAT RAHMAN

Abstract: Usage of data through cellular devices are growing exponentially due to the growing popularity of smart phones and tablets. Because of their smaller sizes and reduced capabilities, it is sometimes hard to impose adequate security measures to these everyday used devices. Thus they become a popular target for data theft and misuse. Because of the nature of cellular network various kinds of attack on the cellular devices such as distributed denial-of-service (DDoS) are happening frequently. Conventional security measures for the layered architecture cannot cope with this ever evolving security issue. Thus we have proposed an enhancement of cross-layer design for security in wireless network entitled as Cellular Cross-layer Intrusion Detection and Response (CXIDR). We have utilized the cross-layer design which integrates features from various layers for detecting intrusions in wireless environment and our proposed system enhances performance up to 20%.

  • Publication Date: 11-Dec-2015
  • DOI: 10.15224/978-1-63248-077-4-17
  • Views: 0
  • Downloads: 0

PERFORMANCE OF MOBILE BASE STATION USING GENETIC ALGORITHMS ON NETWORK LIFETIME IN DIFFERENT BASE STATION PATTERNS

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION PROCESSING AND COMMUNICATION TECHNOLOGY
Author(s): N. M. ABDUL LATIFF , I.S, ISMAIL

Abstract: Wireless sensor network is basically composed of large number of sensor nodes and a base station. The sensor nodes usually are irreplaceable and powered by limited power supply. Taking the fact into consideration, a network should operate with minimum energy as possible to increase lifetime of network for improving the overall energy efficiency. In this work, we proposed a protocol for mobile base station using Genetic Algorithms to find optimal position for base station from predetermined location of base station. The predetermined locations of base station are from three mobility patterns for the base station; random, grid and circle mobility patterns. Simulation results have shown that the normalized network lifetime using grid mobility pattern are higher than random and circle mobility patterns.

  • Publication Date: 11-Dec-2015
  • DOI: .15224/978-1-63248-077-4-18
  • Views: 0
  • Downloads: 0