Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy …

J Amutha, S Sharma, SK Sharma - Computer Science Review, 2021 - Elsevier
Abstract Wireless Sensor Networks (WSNs) have attracted various academic researchers,
engineers, science, and technology communities. This attraction is due to their broad …

Autonomic schemes for threat mitigation in Internet of Things

QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

A decentralized energy efficient hierarchical cluster-based routing algorithm for wireless sensor networks

M Sabet, HR Naji - AEU-International Journal of Electronics and …, 2015 - Elsevier
Load balancing using clustering method is one of the most practical solutions, regarding to
energy limitation in wireless sensor networks. Clustering protocols have to ensure reliability …

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

S Shamshirband, A Patel, NB Anuar, MLM Kiah… - … Applications of Artificial …, 2014 - Elsevier
Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to
detect such malicious behavior using traditional intrusion detection systems in Wireless …

An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique

S Shamshirband, NB Anuar, MLM Kiah… - Engineering Applications of …, 2013 - Elsevier
The deployment of wireless sensor networks and mobile ad-hoc networks in applications
such as emergency services, warfare and health monitoring poses the threat of various …

A survey of optimization algorithms for wireless sensor network lifetime maximization

RM Curry, JC Smith - Computers & Industrial Engineering, 2016 - Elsevier
Wireless sensor networks (WSN) consist of a set of sensors and collection sinks that gather
and analyze environmental conditions. Spurred by the growing need for data collection and …

D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks

S Shamshirband, A Amini, NB Anuar, MLM Kiah… - Measurement, 2014 - Elsevier
Owing to the scattered nature of Denial-of-Service attacks, it is tremendously challenging to
detect such malicious behavior using traditional intrusion detection systems in Wireless …

PAWN: a payload‐based mutual authentication scheme for wireless sensor networks

M Jan, P Nanda, M Usman, X He - … and Computation: Practice …, 2017 - Wiley Online Library
Wireless sensor networks (WSNs) consist of resource‐starving miniature sensor nodes
deployed in a remote and hostile environment. These networks operate on small batteries …

Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks

S Shamshirband, NB Anuar, MLM Kiah… - Journal of Network and …, 2014 - Elsevier
Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to
identify such malicious behavior using traditional intrusion detection systems in Wireless …