CFP last date
20 December 2024
Reseach Article

Intrusion Detection in Wireless Networks using FUZZY Neural Networks and Dynamic Context-Aware Role based Access Control Security (DCARBAC)

by A. K. Santra, Nagarajan S., Jinesh V. N.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 4
Year of Publication: 2012
Authors: A. K. Santra, Nagarajan S., Jinesh V. N.
10.5120/4809-7002

A. K. Santra, Nagarajan S., Jinesh V. N. . Intrusion Detection in Wireless Networks using FUZZY Neural Networks and Dynamic Context-Aware Role based Access Control Security (DCARBAC). International Journal of Computer Applications. 39, 4 ( February 2012), 23-31. DOI=10.5120/4809-7002

@article{ 10.5120/4809-7002,
author = { A. K. Santra, Nagarajan S., Jinesh V. N. },
title = { Intrusion Detection in Wireless Networks using FUZZY Neural Networks and Dynamic Context-Aware Role based Access Control Security (DCARBAC) },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 4 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number4/4809-7002/ },
doi = { 10.5120/4809-7002 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:25:34.348211+05:30
%A A. K. Santra
%A Nagarajan S.
%A Jinesh V. N.
%T Intrusion Detection in Wireless Networks using FUZZY Neural Networks and Dynamic Context-Aware Role based Access Control Security (DCARBAC)
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 4
%P 23-31
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper Proposes a Dynamic Context Aware Role Based Access Control Security Service Which Provides Multi-Level Authentications and Authorization. This model help the building of Secure Devices efficiently .This security service in a Dynamic Environment uses Fuzzy Logic theory And the DCARBAC to change the Privileges. The System uses the Attribute Values in the DCARBAC to Calculate the Type of Role which in turn is associated with the level of Permission And Security. This helps in Extending the present functionality. This Model’s aim is to improve the flexibility of the Security Services in a Heterogeneous Wireless Network.

References
  1. A K Dey, “Providing Architectural Support for building Context aware Applications”, PhD dissertation,Georgia institute of technology,2000.
  2. Gualing Chen, “A survey of Mobile computing Research”, darmouth university computer science technical report TR2000-381, 2000.
  3. Leveraging IPsec for Distributed Authorization, Trent Jaeger, David King, Kevin Butler, Jonathan McCune, Ramon Caceres, Serge Hallyn, Joy Latten, Reiner Sailer and Xiolan Zhang. nsrc.cse. psu.edu /tech _report/NAS-TR-0037-2006.pdf, 2006
  4. T. Blackwell and J. Branke, “Multi-swarm optimization in dynamic environments,” in Applications of Evolutionary Computing, Coimbra, Portugal, Apr. 2004, pp. 489–500.
  5. G. A. Carpenter and S. Grossberg, “A massively parallel architecture for a self-organizing neural pattern recognition machine,” Computer, Vision, Graphics and Image Processing, 37, 1987, 54-115.
  6. G.A. Carpenter, S. Grossberg, and J. H. Reynolds, “ARTMAP: supervised real-time learning and classification of nonstationary data by a self-organizing neural network,” Neural Networks, 4, 565-588, 1991.
  7. G. A. Carpenter, S. Grossberg, N. Markuzon, J. H. Reynolds, and D. B. Rosen, “Fuzzy ARTMAP: a neural network architecture for incremental supervised learning of analog multidimensional maps,” IEEE Trans. on Neural Networks, 3:5, 698-713, 1992.
  8. Eric Granger, Philippe Henniges, Robert Sabourin, Luiz S. Oliveira “Supervised Learning of Fuzzy ARTMAP Neural Networks Through Particle Swarm Optimization”, Journal of Pattern Recognition Research 1 (2007) 27-60
  9. M. Stone,”Cross-validatory choice and assessment of statistical predictions,” Journal of the Royal Statistical Society, 111-147, 1974.
  10. A. Nickabadi, M. M. Ebadzadeh, and R. Safabakhsh, “Evaluating the performance of DNPSOin dynamic environments,” in IEEE Int’l Conference on Systems, Man, and Cybernetics, Singapore, Oct. 2008, pp. 12–15.
  11. W. Du and B. Li, “Multi-strategy ensemble particle swarm optimization for dynamic optimization,” Information Science, vol. 178, no. 15, pp. 3096–3109, 2008.
  12. X. Li, J. Branke, and T. Blackwell, “Particle swarm with speciation and adaptation in a dynamic environment,” in Genetic And Evolutionary Computation Conference, Seattle, USA, Jul. 2006, pp. 51–58.
  13. E. Ozcan and M. Yy´lmaz, “Particle swarms for multimodal optimiza¬tion,” in Adaptive and Natural Computing Algorithms, Warsaw, Poland, Apr. 2007, pp. 366–375.
  14. A. Carlisle and G. Dozier, “Tracking changing extrema with adaptive particle swarm optimizer,” in World Automation Congress, Orlando, Florida USA, Jun. 2002, pp. 265–270.
  15. X. Hu and R. C. Eberhart, “Adaptive particle swarm optimization: Detection and response to dynamic systems,” in IEEE Congress on Evolutionary Computation, vol. 2, Honolulu, USA, May 2002, pp. 1666– 1670.
  16. H. Wang, D. Wang, and S. Yang, “Triggered memory-based swarm optimization in dynamic environments,” in Applications of Evolutionary Computing, Valencia, Spain, Apr. 2007, pp. 637–646.
  17. Jean-Francois Connolly, Eric Granger and Robert Sabourin, “An Adaptive Ensemble of Fuzzy ARTMAP Neural Networks for Video-Based Face Classification”
  18. G. Valentini, “Ensemble methods based on bias-variance analysis,” Ph.D. dissertation, PhD thesis, University of Genova, 2003.
  19. Dr. A K Santra and Nagarajan S, A Method of Access in a Dynamic Context aware Role based Access Control Model for wireless Network, International Jurnal of Computer and Network security, Vol.2, NO.4,April 2010.
  20. Kiyeal Lee, Seo Khwan Yang, Sungik Jun and Mokdong Chung, “Context-Aware Security Service in RFID/USN Environments using MAUT and Extended GRBAC ”, Journal of Information Assurance and Security 2 (2007) 250-256.
Index Terms

Computer Science
Information Sciences

Keywords

Context Aware Security Dcarbac Fuzzy Logic Fuzzy Artmap