期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET 被引量:1
1
作者 S.Neelavathy Pari k.sudharson 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2775-2789,共15页
A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,... A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,from the other side,are exposed to severe potential threats that are difficult to counter with present security methods.As a result,several safe communication protocols designed to enhance the secure interaction among MANET nodes.In this research,we offer a reputed optimal routing value among network nodes,secure computations,and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism(HTRM).In addition,the study designs a robust Public Key Infrastructure(PKI)system using the suggested trust evaluation method in terms of“key”generation,which is a crucial component of a PKI cryptosystem.We also concentrate on the solid node authenticating process that relies on pre-authentication.To ensure edge-to-edge security,we assess safe,trustworthy routes to secure computations and authenticate mobile nodes,incorporating uncertainty into the trust management solution.When compared to other protocols,our recommended approach performs better.Finally,we use simulations data and performance evaluation metrics to verify our suggested approach’s validity Our approach outperformed the competing systems in terms of overall end-to-end delay,packet delivery ratio,performance,power consumption,and key-computing time by 3.47%,3.152%,2.169%,and 3.527%,3.762%,significantly. 展开更多
关键词 Mobile ad-hoc network trust management secure authentication reputation mechanism secure routing
下载PDF
An Enhanced Trust-Based Secure Route Protocol for Malicious Node Detection
2
作者 S.Neelavathy Pari k.sudharson 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2541-2554,共14页
The protection of ad-hoc networks is becoming a severe concern because of the absence of a central authority.The intensity of the harm largely depends on the attacker’s intentions during hostile assaults.As a result,... The protection of ad-hoc networks is becoming a severe concern because of the absence of a central authority.The intensity of the harm largely depends on the attacker’s intentions during hostile assaults.As a result,the loss of Information,power,or capacity may occur.The authors propose an Enhanced Trust-Based Secure Route Protocol(ETBSRP)using features extraction.First,the primary and secondary trust characteristics are retrieved and achieved routing using a calculation.The complete trust characteristic obtains by integrating all logical and physical trust from every node.To assure intermediate node trust-worthiness,we designed an ETBSRP,and it calculates and certifies each mobile node's reputation and sends packets based on that trust.Connection,honesty,power,and capacity are the four trust characteristics used to calculate node repu-tation.We categorize Nodes as trustworthy or untrustworthy according to their reputation values.Fool nodes are detached from the routing pathway and cannot communicate.Then,we use the cryptographic functions to ensure more secure data transmission.Finally,we eliminate the untrustworthy nodes from the routing process,and the datagram from the origin are securely sent to the target,increas-ing throughput by 93.4%and minimizing delay. 展开更多
关键词 Ad-hoc network wireless security trust management data Mining CRYPTOGRAPHY
下载PDF
Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation
3
作者 B.Murugeshwari S.Rajalakshmi k.sudharson 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2293-2307,共15页
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this data.In several data mining methods,privacy has ... Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this data.In several data mining methods,privacy has become highly critical.As a result,various privacy-preserving data analysis technologies have emerged.Hence,we use the randomization process to reconstruct composite data attributes accurately.Also,we use privacy measures to estimate how much deception is required to guarantee privacy.There are several viable privacy protections;however,determining which one is the best is still a work in progress.This paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data results.Further-more,this paper investigates the use of arbitrary nature with perturbations in privacy preservation.According to the research,arbitrary objects(most notably random matrices)have"predicted"frequency patterns.It shows how to recover crucial information from a sample damaged by a random number using an arbi-trary lattice spectral selection strategy.Thisfiltration system's conceptual frame-work posits,and extensive practicalfindings indicate that sparse data distortions preserve relatively modest privacy protection in various situations.As a result,the research framework is efficient and effective in maintaining data privacy and security. 展开更多
关键词 Data mining data privacy ARBITRARINESS data security PERTURBATION
下载PDF
Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography
4
作者 B.Murugeshwari D.Selvaraj +1 位作者 k.sudharson S.Radhika 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期839-851,共13页
Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from... Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from numerous remote databases.Mining algorithms can obtain sensitive information once the data is in the data warehouse.Many traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud platform.These strategies are primarily concerned with protecting the privacy of user data.This study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve infinitefields.This approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing techniques.Also,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the data.Average approximation error,computational cost,anonymizing time,and data loss are considered performance measures.The suggested approach is practical and applicable in real-world situations according to the experimentalfindings. 展开更多
关键词 Data mining CRYPTOGRAPHY privacy preserving elliptic curve information security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部