Dear Editor-In-Chief (Tole Sutikno)  I hope to you having a good day.  It is my great pleasure for accepting my paper entitled “Risk Assessment Optimization for Decision Support using Intelligent Model based on Fuzzy Inference Renewable Rules ".  Dear Edi

Title:Risk Assessment Optimization for Decision Support using Intelligent Model based on Fuzzy Inference Renewable Rules

Abdulkareem Merhej Radhi


Title:Risk Assessment Optimization for Decision Support using Intelligent Model based on Fuzzy Inference Renewable Rules


Due to unreliability of wired communications and the risks of controlling the process of transmitsing data besides the complications that affecting data protection and the high costs of systems infrastructure, led to use wireless communications instead of wires media, but these networks are valunerable towards illegal attacks. The side effects of these attacks are modifying data or penetrate the security system and discover its weaknesses, which leads to great material losses. These risks and difficulties led to reluctance of wires communications and propose intelligent techniques and robust encryption algorithms for preventing data transmitted over wireless networks to keeps it safe from cyber security attacks. So, there is a persistent need for providing intelligent techniques and robust algorithms to preserve conveyed information using wireless network. This paper introduces asenario for proposing intelligent technique to increase data reliability and provides a new way to improve high level of protection besides reduces infrastructre cost.  The proposed system relies on two models, where the first model based on producing a knowledge base of risk rules while the the aim of the second module is a risk assessment outcomes and encryption process according to attacks type. In this system, reducing risks levels based on renewable rules while a novel security system based on non-periodic keys with unsystematic operations using fuzzy system. We conclude that the proposed system has the ability to protect the transmitted data, increases its reliability and reduce the potential risks. MATLAB Toolkit 2014 then Weka open sources package were used in encryption and data mining for the proposed system.


Encryption; Fuzzy; Cipher Key ;WLAN; Risk Assessment



. Choil, Robles, and Kim, "Wireless Network Security: Vulnerabilities, Threats and Countermeasures", International Journal of Multimedia and Ubiquitous Engineering Vol. 3, No. 3, July 2008.

. Bhatia and Sumbaly, "Framework for Wireless Network Security Using Quantum Cryptography", department of Computer Science in Dubai, UAE, 2013.

. Waliullah and Gan, "Wireless Network Security: Vulnerabilities, A Literature Review", International Journal of Advanced Computer Science and Applications, Vol. 5, No. 1, 2014.

. Md Waliullah, and et. al, "An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network", International Journal of Future Generation Communication and Networking Vol. 8, No. 1 (2015), pp.9-18

. P. Kahai, S. Kahai, “Deployment Issues and Security Concerns with Wireless Local Area Networks:” The Deployment Experience at A University” Journal of Applied Business Research, 2004, vol. 20, no. 4.

. Liu.Tao, and et. al., "An Evaluation of Feature Selection for Text Clustering", Nankai University, 2002.

. Sedghi and Kaghazgaran, "Data Security via Public-Key Cryptography in Wireless Sensor Network", International Journal on Cybernetics & Informatics (IJCI) Vol.2, No.3, June2013.

. J.Lynne, “Hot Tips for Securing Your Wi-Fi Network”, 2012.

. Malik, Kapoor, Naryan, and Singh, "Rule Based Technique detecting Security attack for Wireless Sensor Network Using Fuzzy Logic" , International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012.

. Radhi, A., “Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules”, International Journal of Science and Research (IJSR), 2017.

. A., Nabeela, J., Najumnissa, R., L. Arun,” Comparative analysis of energy based optimized dynamic source multipath routing protocol in WSNs”, Indonesian Journal of Electrical Engineering and computer Science”, Vol. 16, No. 1, October 2019, pp. 441-455.

. D. Michel,” Bayesian Segmentation in Signal with Multiplicative Noise Using Reversible Jump MCMC ”, TELKOMNIKA, Vol.16, No.2, April 2018, pp. 673~680.

H., Omer, B., Smajo, “Risk assessment for ancillary services”, International Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 3, June 2019, pp. 1561~1568

Total views : 30 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics