Machine learning for coverage optimization in wireless sensor networks: a comprehensive review

OS Egwuche, A Singh, AE Ezugwu, J Greeff… - Annals of Operations …, 2023 - Springer
In the context of wireless sensor networks (WSNs), the utilization of artificial intelligence (AI)-
based solutions and systems is on the ascent. These technologies offer significant potential …

Utilize DBN and DBSCAN to detect selective forwarding attacks in event-driven wireless sensors networks

Q Li, Y Ma, Y Wu - Engineering Applications of Artificial Intelligence, 2023 - Elsevier
Malicious nodes launching selective forwarding attacks jeopardize network reliability in
event-driven wireless sensor networks. Swift detection and exclusion of these nodes are …

Advancing security and trust in wsns: A federated multi-agent deep reinforcement learning approach

H Moudoud, Z Abou El Houda… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) show significant potential through their ability to collect
and analyze real-time data, notably enhancing various sectors. The new emerging security …

[HTML][HTML] Towards a lightweight security framework using blockchain and machine learning

S Ismail, M Nouman, DW Dawoud, H Reza - Blockchain: Research and …, 2024 - Elsevier
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor
networks, necessitating the development of robust countermeasures tailored to their unique …

Detection and prevention of sinkhole attacks in MANETS based routing protocol using hybrid AdaBoost-Random forest algorithm

SSM Vincent, N Duraipandian - Expert Systems with Applications, 2024 - Elsevier
Abstract WSN (Wireless Sensor Network) is considered as one of the promising
technologies which are utilized in various fields for various applications. Along with it …

A Comparative Study of Lightweight Machine Learning Techniques for Cyber-attacks Detection in Blockchain-Enabled Industrial Supply Chain

S Ismail, S Dandan, DW Dawoud, H Reza - IEEE Access, 2024 - ieeexplore.ieee.org
The security of Industrial Supply Chain (ISC) has emerged through the integration of
Industrial Internet of Things (IIoT) and Blockchain (BC) technology. This new era involves …

Using Multi-Armed Bandit Learning for Thwarting MAC Layer Attacks in Wireless Networks

H Dutta, AK Bhuyan, S Biswas - IEEE/ACM Transactions on …, 2024 - ieeexplore.ieee.org
This paper proposes a learning-driven approach for medium access slot allocation in the
presence of malicious nodes. Learning policies are developed with the goal of defending …

A comparative study of datasets for cyber-attacks detection in wireless sensor networks

S Ismail, DW Dawoud, H Reza - 2024 IEEE 3rd International …, 2024 - ieeexplore.ieee.org
Machine Learning (ML) is one of the effective security approaches to build cyber-attacks
detection systems in Wireless Sensor Networks (WSNs). ML leverages the power of data …

Prevention of Security Attacks at Wireless Network Layers using Machine Learning Techniques

S Ramisetty, GSP Ghantasala… - 2024 11th International …, 2024 - ieeexplore.ieee.org
Wireless sensor networks have great potential for use in flood control, weather forecasting
systems, the military, and the healthcare industry. A WSN's nodes are connected to one …

Using Complex Network Analysis Techniques to Uncover Fraudulent Activity in Connected Healthcare Systems

SK Rajamani, RS Iyer - Practical Applications of Data Processing …, 2024 - igi-global.com
Complex network analysis is a powerful approach for finding fraud in a network. This is an
application of graph theory that enables the depiction of relationships between entities as …