Implementation of IDS Within a Crew Using ID3Algorithm in Wireless Sensor Local Area Network

  • K. RajaEmail author
  • M. Lilly Florence
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)


Mobile and Pervasive Computing was introduced by the technological vision of Mark Weiser. With the ideology of Urban Development, it is considered that the world will be composed of interconnected devices and system models of networks, which allows the accessibility of information present across the globe. A U-City characterized by the information and computing technologies is gradually becoming indistinguishable and unviable from daily life. In that regard, this article provides an in-depth evaluation of Mobile and Pervasive Computing considered as an evolutionary framework applicable in electric motors, which are invisible hence forming a pervasive environment. Mobile technology will play an essential role in urban development. This signifies that the mobility initiatives are applicable for many telecommunication aspects used in our daily lives. The article starts by illustrating the significant mobile technologies in the urban areas, thereby elaborating on the planning format of pervasive computing, which is meant for urban development. To effective plan for the establishment or expansion of urban centers, the article calls for planners to concentrate on the formation of pervasive computing areas that define the correlations between people, places, objects, buildings and infrastructure. Mobile Crowd Sourcing Technologies for smart environments calls for planners to concentrate on revolutionizing the globe by aligning technological functions and enhance the integration and coordination of various services involved in technological intelligence.


Mobile computing Pervasive Computing Urban development Virtual reality Mobile Crowd Sourcing Technologies 


  1. 1.
    Sun, Z., Xu, Y., Liang, G., Zhou, Z.: An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Publication, 1558–1748, pp. 567–580 (2017)Google Scholar
  2. 2.
    Sultana, A., Jabbar, M.A.: Intelligent network intrusion detection system using data mining techniques. In: IEEE Publication, pp. 85–89 (2016)Google Scholar
  3. 3.
    Raja, K., Florence, M.L.: Tracking of intruder in local area network using decision tree learning algorithms. Asian J. Appl. Sci. 05(01), 46–49 (2017). ISSN:2321–0893Google Scholar
  4. 4.
    Verma, A., Ranga, V.: Statistical analysis of cidds-001 dataset for network intrusion detection system using distance–based machine learning. In: 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7–8 December 2017, pp. 709–716. Elsevier Publication (2017)Google Scholar
  5. 5.
    Mageswari, G., Karthikeyan, M.: Intrusion detection using data mining techniques. Int. J. Eng. Sci. Invent. (IJESI) (2018). ISSN (Online):2319–6734, ISSN (Print):2319–6726Google Scholar
  6. 6.
    Goliwale, P., Gupta, V., Johre, A., Bendale, S.: Intrusion detection system using data mining. Int. Res. J. Eng. Technol. (IRJET) 05(03), 234–238 (2018)Google Scholar
  7. 7.
    Al-Dabbagh, A.W., Li, Y., Chen, T.: An intrusion detection system for cyber attacks in wireless networked control systems. IEEE Publication, 1549–7747, pp 789–799 (2016)Google Scholar
  8. 8.
    Moosavi, H., Bui, F.M.: A game –theoretic framework for robust optimal intrusion detection in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 9, 524–529 (2014)CrossRefGoogle Scholar
  9. 9.
    Zhang, Z., Zhu, H., Luo, S., Xin, Y., Liu, X.: Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Publication, pp 457–462 (2017)Google Scholar
  10. 10.
    Mehmood, A., Khan, A., Umar, M.M., Abdullah, S., Ariffin, K.A.Z., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Publication, 2169–3536, pp 309–314 (2017)Google Scholar
  11. 11.
    Jaiganesh, V., Rutravigneshwaran, P., Sumathi, P.: An efficient algorithm for network intrusion detection system. Int. J. Comput. Appl. 90(12), 894–896 (2014). (0975–8887)Google Scholar
  12. 12.
    Gupta, A., Jha, R.K., Gandotra, P., Jain, S.: Bandwidth spoofing and intrusion detection system for multistage 5G wireless communication network. IEEE Trans. Veh. Technol. 67(1), 128–134 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Bharathiar UniversityCoimbatoreIndia
  2. 2.Adhiyamaan College of EngineeringHosurIndia

Personalised recommendations