Work place: Dept. of Computer Science, Jazan University, Jazan, KSA
E-mail: talkshuaib@gmail.com
Website:
Research Interests: Artificial Intelligence, Autonomic Computing, Intrusion Detection System, Network Architecture, Network Security, Computing Platform
Biography
Mohammed Shuaib is presently working as a lecturer at Department of Computer Science, Jazan University, KSA. His Research area is Security, Artificial intelligence, Sensor network, Cloud Computing and Intrusion Detection Techniques. He received his M. Tech in Software Engineering from Department of Computer Engg., AMU, Aligarh, India in the year 2012. He has also served for three years as an Assistant Professor in the Department of Computer Engg., Integral University, Lucknow, India.
By Abdus Samad Mohammed Shuaib Mohd Rizwan Beg
DOI: https://doi.org/10.5815/ijcnis.2017.12.05, Pub. Date: 8 Dec. 2017
Rapid development of Wireless sensor network led to applications ranging from industry to military fields. These sensors are deployed in the military base station such as battlefield surveillances. The important issues like security & DoS attacks play crucial role for wireless sensor network. Due to the limitations of resources, traditional security scheme cannot be employed efficiently. Therefore, designing a framework that can operate securely using smart intelligence technique is the best option. In this paper, an efficient way of detecting an intrusion using Flooding and Ant colony is proposed. The flooding technique enables the master agents to track the activity of intruder tampering the part of the network. The ACO identifies the path followed by the nodes and also the intruder, who wants to jam the whole wireless sensor network. The architecture strategically enables the Bait agents to detect the intruders threatening the network. The proposed framework is designed for the military station. It helps the base station to detect the intrusion and decide whether the activity is normal or terrestrial and send the signal to the nearest missile station situated near the intrusion location and destroy it in minimum time. The process of detecting the intrusion earlier not only helps to learn future attacks, but also a defense counter measures.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals