Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Mohan Raj, K.R.; * | Katiravan, Jeevaa
Affiliations: Department of Information Technology, Velammal Engineering College, Chennai, Tamilnadu, India
Correspondence: [*] Corresponding author. K.R. Mohan Raj, Department of Information Technology, Velammal Engineering College, Chennai-600 066, Tamilnadu, India. E-mail: [email protected].
Abstract: Recently, security has been necessary in this computer world due to the fast development of technology and enormous user strength. The different kinds of security mechanisms including the Intrusion Detection System (IDS) were developed by many researchers to confirm the security of the data in the communication process. In general, the IDS are used to detect anomalous nodes, and attacks and increase the security level. Even though, the various disadvantages are available to ensure the data reliability on different kinds of applications. For this purpose, this work proposes a cross-layer IDS that is a combination of the trust-based secure routing method, attribute selection and classification algorithms. This study introduces a novel attribute selection approach known as the Weighted Genetic Feature Selection Algorithm (WGFSA). This method is designed to identify and prioritize valuable attributes within the context of network, physical, and data link layers. And introduce a deep classifier called the Hyperparameter-Tuned Fuzzy Temporal Convolutional Neural Network (HFT-CNN) for efficient categorization. Additionally, we propose a pioneering secure routing algorithm known as the Fuzzy Logic and Time-Constrained Dynamic Trusted Cross-Layer-Based Secure Routing Algorithm (FCSRA) to ensure the secure transmission of data packets. The effectiveness of the newly developed system is proved by conducting experiments with the network, standard Aegean Wi-Fi intrusion dataset (AWID) and proved superior to other systems in delay, energy consumption, packet delivery rate, and prediction accuracy.
Keywords: Fuzzy temporal logic, intrusion detection systems, trust score, cross-layer, deep learning, attribute selection, secure routing
DOI: 10.3233/JIFS-233275
Journal: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6171-6183, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]