Adaptive System to Improve Decision Making for Protecting Data Conveyed over WLAN
Abdulkareem Merhej Radhi

Abdulkareem Merhej Radhi*, Information and Communication Dept. Al Nahrain University, Baghdad, Iraq.

Manuscript received on September 13, 2019. | Revised Manuscript received on October 20, 2019. | Manuscript published on October 30, 2019. | PP: 6075-6080 | Volume-9 Issue-1, October 2019 | Retrieval Number: A1936109119/2019©BEIESP | DOI: 10.35940/ijeat.A1936.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: In the past two decades, the rapid growth of demand for wireless data communications has become evident due to the unreliability of wired data communications, which has become inadequate due to high costs and management monitoring of its security problems. Furthermore, such data may be intercepted when transmitted via wire connections with a negative attack and its contents changed with illegal modification. Therefore, due to these circumstances, there is an urgent need to protect data and achieve a wireless local area network (WLAN) for transmission. Data protection is therefore required through the design and implementation of a rigid algorithm that reduces the risk of hacking into wireless networks and prevents hackers from finding inevitable vulnerabilities in the data protection system. This research paper introduces a new technology to protect data from potential risks and provides a new “type” of encryption algorithms that minimizes these risks. This technology relies on the adoption of renewable rules proposed as production bases based on ambiguous logic to accomplish the construction of an intelligent data analysis system and move forward with appropriate protection decisions. The targeted packets for the local area network were captured and analyzed using open source software “WIRESHARK”. Unsupervised learning classifier was used to monitor the network and detect the malicious intruders. The flow data have been collected and features are extracted and analyzed to examine the transmitted packets which were classified and ranked to have a specific cluster. Minimizing and comprising risk taking in consideration the imprecise data which was achieved via fuzzy rules. The results were discussed and concluded that potential risks could be minimized by the production rules that control the proposed data for the transferred encryption system. MATLAB 2014 toolkit based on a laptop with an Intel I3 processor and 4GB RAM was used.
Keywords: Encryption, Decision, Fuzzy, Entropy, WLAN, Shift Register, Risk.