Wormhole attack mitigation strategies and their impact on wireless sensor network performance: A literature survey

H Shahid, H Ashraf, A Ullah, SS Band… - International journal of …, 2022 - Wiley Online Library
Wireless sensor networks (WSNs) consist of hundreds of small sensors that collect and
report data. During data sharing, these WSNs become vulnerable to numerous security …

Recent advances and future prospects of using AI solutions for security, fault tolerance, and QoS challenges in WSNs

W Osamy, AM Khedr, A Salim, AA El-Sawy… - Electronics, 2022 - mdpi.com
The increasing relevance and significant acceptance of Wireless Sensor Network (WSN)
solutions have aided the creation of smart environments in a multitude of sectors, including …

An efficient attack detection and prevention approach for secure WSN mobile cloud environment

SS Vellela, R Balamanigandan - Soft Computing, 2024 - Springer
Abstract Wireless Sensor Network (WSN) is a network with a good organization that
provides efficient communication services. However, high energy usage and attack data …

Hybrid Marine Predator Algorithm and Hide Object Game Optimization.

PD Kusuma, D Adiputra - Engineering Letters, 2023 - search.ebscohost.com
This work presents a hybrid metaheuristic, namely a hybrid marine predator algorithm-hide
object game optimization (MPA-HOGO). MPA-HOGO is built by combining two shortcoming …

Analysis of Conventional Techniques on Detecting DDoS Attack in Wireless Sensor Network with Varied Feature Combination

PH Chitte, SS Chaudhari - 2024 8th International Conference …, 2024 - ieeexplore.ieee.org
Numerous security threats, such as sinkhole attacks, tampering attacks, and denial-of-
service (DoS) assaults, are present in wireless sensor networks (WSNs). Thus, it is essential …

A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks

RS Raghav, D Bhattacharyya, DK Anguraj… - Personal and Ubiquitous …, 2023 - Springer
Wireless sensor networks consist of some sensor nodes that have a minimum operational
capability, with less memory capacity for storing data and limited energy sources. The …

Fuzzy Based Image Edge Detection Using Improved Artificial Bee Colony Optimization Algorithm

A Verma, N Dhanda, V Yadav - … Conference on Data Analytics and Insights, 2023 - Springer
The goal of evolutionary algorithms (EAs) is to eliminate solutions with the least fitness in
order to identify the best one. This study offers an evolution-based edge identification …

Exploitation of Meta-Heuristic Search Methods with Bio-Inspired Algorithms for Optimal Feature Selection

MA Basir, MS Hussin - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
It is very difficult and crucial to achieve the selection of optimal features, particularly for the
classification task. Because the conventional method of identifying features that function …