Skip to content

It is a detection system for an unauthorized access in a wireless network which prevents malicious activity from occurring in an IOT based network .To check the output you have to run out.nam file in NS-2 or you can see the output results in the output folder

Notifications You must be signed in to change notification settings

Er-Sadiq/Decentralized-Intrusion-Detection-System-For-IOT-Based-Applications

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Intrusion Detection System For IOT Based Applications

Explore my Intrusion Detection System (IDS) for IoT applications, crafted with NS2, C, Linux, and TCL. My solution leverages a reputation-based trust algorithm to precisely detect unauthorized access, mitigating threats like blackhole and wormhole attacks. Achieve a 72% security boost with minimal false positives. Enhance your IoT security !!

Authors

Features

  • NS2, C, Linux, and TCL-based IDS
  • Reputation-based trust algorithm
  • Mitigates blackhole and wormhole attacks
  • 72% increased security against threats
  • Robust Implementation Model

Screenshot 2021-06-16 131528 Screenshot 2021-06-16 131452

About

It is a detection system for an unauthorized access in a wireless network which prevents malicious activity from occurring in an IOT based network .To check the output you have to run out.nam file in NS-2 or you can see the output results in the output folder

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published