Energy optimization techniques in underwater internet of things: issues, state-of-the-art, and future directions

DR Kesari Mary, E Ko, DJ Yoon, SY Shin, SH Park - Water, 2022 - mdpi.com
The underwater internet of things (UIoT) has emerged as a booming technology in today's
digital world due to the enhancement of a wide range of underwater applications concerning …

Data redundancy reduction for energy-efficiency in wireless sensor networks: A comprehensive review

G Sahar, KBA Bakar, FT Zuhra, S Rahim, T Bibi… - IEEE …, 2021 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) play a significant role in providing an extraordinary
infrastructure for monitoring environmental variations such as climate change, volcanoes …

Detection of DDOS attack using deep learning model in cloud storage application

A Agarwal, M Khari, R Singh - Wireless Personal Communications, 2022 - Springer
In recent years, distributed denial of service (DDoS) attacks pose a serious threat to network
security. How to detect and defend against DDoS attacks is currently a hot topic in both …

Energy efficient architecture for mitigating the hot-spot problem in wireless sensor networks

D Jain, PK Shukla, S Varma - Journal of Ambient Intelligence and …, 2023 - Springer
In wireless sensor networks (WSNs), mutual coordination of cluster heads (CHs) is essential
to transmit their data towards the sink node through many-hop fashion. As a result of this …

An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT

AAM Teodoro, OSM Gomes, M Saadi, BA Silva… - Wireless Personal …, 2022 - Springer
Nowadays, the high number of devices and applications connected to the Internet has
generated a great amount of data being which makes privacy and protection a more …

EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT

P Singh, M Khari, S Vimal - Wireless Personal Communications, 2022 - Springer
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need
wireless connectivity regardless of their geographical location. Threats of security attacks …

Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks

K Lakshmi Narayanan, R Santhana Krishnan… - Wireless Personal …, 2021 - Springer
Wireless sensor network allows nodes to communicate with another using wireless
channels so that it is necessary for packet delivery to the nodes. Black hole attack occurs …

Line monitoring and identification based on roadmap towards edge computing

Y Liu, Q Sun, A Sharma, A Sharma… - Wireless personal …, 2022 - Springer
In recent years, with the rapid growth of Internet of Things (IoT) and cloud services having
received special attention from the research community across the world. IoT provides a …

[PDF][PDF] DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning.

Y Sanjalawe, T Althobaiti - Computers, Materials & Continua, 2023 - cdn.techscience.cn
Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received
paramount interest over the last few years. Among the latest approaches, Deep Learning …

3-dimensional manifold and machine learning based localization algorithm for wireless sensor networks

YH Robinson, S Vimal, EG Julie… - Wireless Personal …, 2022 - Springer
The minimized amount of Localization accuracy is one of the common issues in Wireless
sensor networks. The determination of unknown nodes in a network needs good localization …