Systematic literature review on energy efficient routing schemes in WSN–a survey
In wireless sensor networks (WSN), routing is quite challenging area of research where
packets are forwarded through multiple nodes to the base station. The packet being sent …
packets are forwarded through multiple nodes to the base station. The packet being sent …
Sensors for context-aware smart healthcare: A security perspective
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …
and faster data networks have propelled environments augmented with contextual and real …
A survey on mobility in wireless sensor networks
Abstract As Wireless Sensor Networks (WSNs) and Internet of Things (IoTs) applications
evolve, the need for robust protocols, capable to guarantee extended lifetime and high …
evolve, the need for robust protocols, capable to guarantee extended lifetime and high …
SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments
S Jiang, J Zhao, X Xu - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN), which serves as one of the key components of the cyber
physical system, is a wireless network composed of many stationary or moving sensors in a …
physical system, is a wireless network composed of many stationary or moving sensors in a …
A network intrusion detection method based on deep multi-scale convolutional neural network
X Wang, S Yin, H Li, J Wang, L Teng - International Journal of Wireless …, 2020 - Springer
Network intrusion detection (NID) is an important method for network system administrators
to detect various security holes. The performance of traditional NID methods can be affected …
to detect various security holes. The performance of traditional NID methods can be affected …
Network attack classification in IoT using support vector machines
C Ioannou, V Vassiliou - Journal of sensor and actuator networks, 2021 - mdpi.com
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in
the network define what is expected of the network's operation. It is for this reason that ML …
the network define what is expected of the network's operation. It is for this reason that ML …
STLGBM-DDS: an efficient data balanced DoS detection system for wireless sensor networks on big data environment
Wireless Sensor Networks (WSNs) are vulnerable to a variety of unique security risks and
threats in their data collection and transmission processes. One of the most common attacks …
threats in their data collection and transmission processes. One of the most common attacks …
Performance evaluation of machine learning techniques for DOS detection in wireless sensor network
L Alsulaiman, S Al-Ahmadi - arXiv preprint arXiv:2104.01963, 2021 - arxiv.org
The nature of Wireless Sensor Networks (WSN) and the widespread of using WSN introduce
many security threats and attacks. An effective Intrusion Detection System (IDS) should be …
many security threats and attacks. An effective Intrusion Detection System (IDS) should be …
Neuro-fuzzy based intrusion detection system for wireless sensor network
Malicious attacks like denial-of-service massively affect the network activities of wireless
sensor network. These attacks exploit network layer vulnerabilities and affect all the layers of …
sensor network. These attacks exploit network layer vulnerabilities and affect all the layers of …
A comparative study of ai-based intrusion detection techniques in critical infrastructures
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in
which their owners volunteer them as storage and computing power resources, has become …
which their owners volunteer them as storage and computing power resources, has become …