… can be detected by DRBTS because in DBRTS beacon node … The claim of maliciousnode being neighbor will be detected … by Shah Hosseini is swarm based optimization approach. The …
G Keerthana, G Padmavathi - … Journal of Security and Its Applications, 2016 - academia.edu
… maliciousnode, notifying other nodes … Swarmintelligence algorithms experimented in this study namely, ACO, PSO and EPSO can be applied to detect other wirelesssensornetwork …
M Kumar, P Mukherjee, K Verma… - … on Network Science …, 2021 - ieeexplore.ieee.org
… Network (IDCNN) identifies the MN and then isolates them into the malicious list box in the MaliciousNodesDetection (… Trusted Nodes (TN), and the t-Distribution based Satin Bowerbird …
… is used to find the optimal solutions within this region. In wirelesssensornetworks, intrusion detection systems face many problems such as low detection accuracy, high false alarm …
B Chaudhari - International Journal of Performability Engineering, 2022 - ijpe-online.com
… of optimization algorithms, particularly swarmintelligence algorithm in … malevolentnodes to wirelesssensornetworks. Further, these maliciousnodes could be utilized as normal node …
S Kumar, S Mehfuz - … Processing and Integrated Networks …, 2019 - ieeexplore.ieee.org
… for maliciousnodedetection and choosing a cluster head in wirelesssensornetwork is … [11] Shabana Mehfuz, Sumit Kumar "Two dimensional particle swarmoptimization algorithm …
… SwarmIntelligence is subfield of provides solution for complex optimization problems which … of Honeybees based algorithms are in the field of ad hoc and wirelesssensornetworks [16]. …
PS Khot, U Naik - Wireless Personal Communications, 2021 - Springer
… in the sensornetwork and it can be used to identify the occurrence of maliciousnode before … [35] developed swarmintelligence–based energy efficient clustering with multihop routing …
VK Kumar, PS Varma - … on Mobile Networks and Wireless …, 2022 - ieeexplore.ieee.org
… The algorithm detects a maliciousnode in the network. It also removes … maliciousnode from the path and makes the wireless event detectionsensornetwork, the compromised network, …