Wormhole attack mitigation strategies and their impact on wireless sensor network performance: A literature survey
Wireless sensor networks (WSNs) consist of hundreds of small sensors that collect and
report data. During data sharing, these WSNs become vulnerable to numerous security …
report data. During data sharing, these WSNs become vulnerable to numerous security …
Recent advances and future prospects of using AI solutions for security, fault tolerance, and QoS challenges in WSNs
The increasing relevance and significant acceptance of Wireless Sensor Network (WSN)
solutions have aided the creation of smart environments in a multitude of sectors, including …
solutions have aided the creation of smart environments in a multitude of sectors, including …
An efficient attack detection and prevention approach for secure WSN mobile cloud environment
SS Vellela, R Balamanigandan - Soft Computing, 2024 - Springer
Abstract Wireless Sensor Network (WSN) is a network with a good organization that
provides efficient communication services. However, high energy usage and attack data …
provides efficient communication services. However, high energy usage and attack data …
Hybrid Marine Predator Algorithm and Hide Object Game Optimization.
PD Kusuma, D Adiputra - Engineering Letters, 2023 - search.ebscohost.com
This work presents a hybrid metaheuristic, namely a hybrid marine predator algorithm-hide
object game optimization (MPA-HOGO). MPA-HOGO is built by combining two shortcoming …
object game optimization (MPA-HOGO). MPA-HOGO is built by combining two shortcoming …
Analysis of Conventional Techniques on Detecting DDoS Attack in Wireless Sensor Network with Varied Feature Combination
PH Chitte, SS Chaudhari - 2024 8th International Conference …, 2024 - ieeexplore.ieee.org
Numerous security threats, such as sinkhole attacks, tampering attacks, and denial-of-
service (DoS) assaults, are present in wireless sensor networks (WSNs). Thus, it is essential …
service (DoS) assaults, are present in wireless sensor networks (WSNs). Thus, it is essential …
A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks
Wireless sensor networks consist of some sensor nodes that have a minimum operational
capability, with less memory capacity for storing data and limited energy sources. The …
capability, with less memory capacity for storing data and limited energy sources. The …
Fuzzy Based Image Edge Detection Using Improved Artificial Bee Colony Optimization Algorithm
The goal of evolutionary algorithms (EAs) is to eliminate solutions with the least fitness in
order to identify the best one. This study offers an evolution-based edge identification …
order to identify the best one. This study offers an evolution-based edge identification …
Exploitation of Meta-Heuristic Search Methods with Bio-Inspired Algorithms for Optimal Feature Selection
It is very difficult and crucial to achieve the selection of optimal features, particularly for the
classification task. Because the conventional method of identifying features that function …
classification task. Because the conventional method of identifying features that function …