Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy …
J Amutha, S Sharma, SK Sharma - Computer Science Review, 2021 - Elsevier
Abstract Wireless Sensor Networks (WSNs) have attracted various academic researchers,
engineers, science, and technology communities. This attraction is due to their broad …
engineers, science, and technology communities. This attraction is due to their broad …
Autonomic schemes for threat mitigation in Internet of Things
QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …
A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …
provide communication among them without human intervention. However, the extensive …
A decentralized energy efficient hierarchical cluster-based routing algorithm for wireless sensor networks
M Sabet, HR Naji - AEU-International Journal of Electronics and …, 2015 - Elsevier
Load balancing using clustering method is one of the most practical solutions, regarding to
energy limitation in wireless sensor networks. Clustering protocols have to ensure reliability …
energy limitation in wireless sensor networks. Clustering protocols have to ensure reliability …
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to
detect such malicious behavior using traditional intrusion detection systems in Wireless …
detect such malicious behavior using traditional intrusion detection systems in Wireless …
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
The deployment of wireless sensor networks and mobile ad-hoc networks in applications
such as emergency services, warfare and health monitoring poses the threat of various …
such as emergency services, warfare and health monitoring poses the threat of various …
A survey of optimization algorithms for wireless sensor network lifetime maximization
Wireless sensor networks (WSN) consist of a set of sensors and collection sinks that gather
and analyze environmental conditions. Spurred by the growing need for data collection and …
and analyze environmental conditions. Spurred by the growing need for data collection and …
D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
Owing to the scattered nature of Denial-of-Service attacks, it is tremendously challenging to
detect such malicious behavior using traditional intrusion detection systems in Wireless …
detect such malicious behavior using traditional intrusion detection systems in Wireless …
PAWN: a payload‐based mutual authentication scheme for wireless sensor networks
Wireless sensor networks (WSNs) consist of resource‐starving miniature sensor nodes
deployed in a remote and hostile environment. These networks operate on small batteries …
deployed in a remote and hostile environment. These networks operate on small batteries …
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to
identify such malicious behavior using traditional intrusion detection systems in Wireless …
identify such malicious behavior using traditional intrusion detection systems in Wireless …