DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 5 Issue 2 Date of Publication:   December 2016

OTBTA: An Optimized Trust Based Traffic Analyzer for Wireless Sensor Networks to Detect Malicious Activities Using Genetic Algorithm

S.Vijayarangam,A.Rajesh

Page(s):   35 -39 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.005.002.002 Publisher:   Integrated Intelligent Research (IIR)


  1. C. Karlof and D.Wagner,   "Secure routing in wireless sensor networks: attacks and countermeasures",   Ad Hoc Networks   ,2003
    View Artical

  2. T. Roosta, S. Pai, P. Chen, S. Sastry, and S. Wicker,   "Inherent security of routing protocols in ad-hoc and sensor networks",   In Global Telecommunications Conference, GLOBECOM   ,2007
    View Artical

  3. W. Xu, W. Trappe, Y. Zhang, and T. Wood,   "The feasibility of launching and detecting jamming attacks in wireless networks",   In Proceedings of the 6th ACM International Sympos   ,2005
    View Artical

  4. W. Xu, K. Ma, W. Trappe, and Y. Zhang,   "Jamming sensor networks: attack and defense strategies",   IEEE Network Magazine   ,2006
    View Artical

  5. M. Stasiak, M. G?abowski, A. Wi?niewski, and P. Zwierzykowski,   "Modeling and Dimensioning of Mobile Networks: From GSM to LTE   ,2011
    View Artical

  6. G. Cena, L. Seno, A. Valenzano, and C. Zunino,   "On the performance of IEEE 802.11e wireless infrastructures for soft-real-time industrial applicatio",   IEEE Trans. Ind. Informat   ,2010
    View Artical

  7. T. Cucinotta, L. Palopoli, L. Abeni, D. Faggioli, and G. Lipari,   "On the integration of application level and resource level QoS control for real-time applications",   IEEE Trans. Ind. Informat   ,2010
    View Artical

  8. K. Leung, W. Massey, and W. Whitt,   "Traffic models for wireless communication networks",   IEEE J. Sel. Areas Commun.,   ,Vol.12   ,1994
    View Artical

  9. M. Gribaudo, C. Chiasserini, R. Gaeta, M. Garetto, D. Manini, and M. Sereno,   "A spatial fluid-based framework to analyze large-scale wireless sensor networks",   International Conference on Dependable Systems and   ,2005
    View Artical

  10. S. Toumpis and L. Tassiulas,   "Packetostatics: deployment of massively dense sensor networks as an electrostatics problem   ,2005
    View Artical

  11. J. Silvester and L. Kleinrock,   "On the capacity of multihop slotted ALOHA networks with regular structure",   IEEE Trans. Commun.,   ,Vol.31   ,1983
    View Artical

  12. M. Franceschetti, O. Dousse, D. Tse, and P. Thiran,   "Closing the gap in the capacity of random wireless networks",   International Symposium on Information   ,2004
    View Artical

  13. M. Bhardwaj, T. Garnett, and A. P. Chandrakasan,   "Upper bounds on the lifetime of sensor networks",   In Proc. IEEE Int. Conf. Communication   ,2001
    View Artical

  14. H. Zhang and J. C. Hou,   "On the upper bound of ??lifetime for large sensor networks",   ACM Trans. Sens. Netw   ,2005
    View Artical

  15. S. Olariu and I. Stojmenovic,   "Design guidelines for maximizing lifetime and avoiding energy holes in sensor networks with uniform ",   Proc. IEEE Int. Conf. Comput. Commun   ,2006
    View Artical

  16. M. Bhardwaj and A. P. Chandrakasan,   "Bounding the lifetime of sensor networks via optimal role assignments",   in Proc. INFOCOM   ,2002
    View Artical

  17. A. P. Azad and A. Chockalingam,   "Wlc12-2: Bounds on the lifetime of wireless sensor networks employing multiple data sinks",   in Proc. GLOBECOM   ,2006
    View Artical

  18. D. M. Blough and P. Santi,   "Investigating upper bounds on network lifetime extension for cell-based energy conservation techniqu",   in Proc. MobiCom   ,2002
    View Artical

  19. R. R. Rout and S. K. Ghosh,   "Enhancement of lifetime using duty cycle and network coding in wireless sensor networks",   IEEE Trans. Wireless Commun.   ,Vol.12   ,2013
    View Artical

  20. M. Neugebauer and K. Kabitzsch,   "A new protocol for a low power sensor network",   in Proc. IEEE Int. Conf. Perform., Computer. Commu   ,2004
    View Artical

  21. Mohammad SazzadulHoque, Md. Abdul Mukit2 and Md. Abu NaserBikas,   "An Implementation Of Intrusion DetectionSystem Using Genetic Algorithm",   International Journal of Network Security & Its Ap   ,2012
    View Artical

  22. A. Chittur,,   "Model Generation for an Intrusion Detection System Using Genetic Algorithms   ,2005
    View Artical

  23. W. Li,   "Using Genetic Algorithm for Network Intrusion Detection",   A Genetic Algorithm Approach to Network Intrusion    ,2004
    View Artical

  24. W. Lu, I. Traore,   "Detecting New Forms of Network Intrusion Using Genetic Programming",   Computational Intelligence   ,2004
    View Artical

  25. M. M. Pillai, J. H. P. Eloff, H. S. Venter,   "An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms",   Proceedings of SAICSIT   ,2004
    View Artical

  26. S. M. Bridges, R. B. Vaughn,   "Fuzzy Data Mining And Genetic Algorithms Applied ToIntrusion Detection",   Proceedings of 12th Annual Canadian Information Te   ,2000
    View Artical

  27. J. Gomez, D. Dasgupta,   "Evolving Fuzzy Classifiers for Intrusion Detection",   Proceedingsof theIEEE   ,2002
    View Artical

  28. M. Middlemiss, G. Dick,   "Feature selection of intrusion detection data using a hybridgeneticalgorithm/KNN approach",   Design and application of hybrid intelligent syste   ,2003
    View Artical

  29. SrinivasMukkamala, Andrew H. Sung, Ajith Abraham,   "Intrusion detection using anensembleof intelligent paradigms",   Journal of Network and Computer Applications   ,Vol.28   ,2005
    View Artical

  30. S. Peddabachigari, Ajith Abraham, C. Grosan, J. Thomas,   "Modeling intrusion detectionsystemusing hybrid intelligent systems",   Journal of Network and Computer Applications   ,Vol.30   ,2007
    View Artical

  31. M. SanieeAbadeh, J. Habibi, C. Lucas,   "Intrusion detection using a fuzzy genetics-basedlearning algorithm",   Journal of Network and Computer Applications   ,2007
    View Artical

  32. Tao Peng, C. Leckie, KotagiriRamamohanarao,   "Information sharing for distributedintrusiondetection systems",   Journal of Network and Computer Applications   ,Vol.30   ,2007
    View Artical