过去一年中添加的文章,按日期排序

HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks

K Dinesh, SVN Santhosh Kumar - Peer-to-Peer Networking and …, 2024 - Springer
27 天前 - … are vulnerable to intrusions from various sources, … attacks, and sensing capture
attacks. Establishing a reliable path from the source node to the BS is crucial for ensuring secure

… of Mobile Sink routing protocol towards Minimization of Propagation Delay against Spatial and Temporal Uncertainties of Cluster based Wireless Sensor Network

MG Hegde - Power System Technology, 2024 - powertechjournal.com
36 天前 - Sensor Network highly exposed to certain security attacks … the secure aggregated
data packets of the sensor node … Comparing with traditional secure routing architecture, …

Secure and Efficient Routing in Wireless Sensor Networks: LD2FA-PSO Intrusion Detection and Cluster HeadSelection

A Dubey - 2024 - researchsquare.com
44 天前 - intrusion detection system (IDS) that enhances energy e ciency in wireless sensor
networks (… to analyze nodes, packets, and routes in order to remove unsolicited assaults and …

Sybil Attack Detection for Secure IoT-Based Smart Healthcare Environments

J Li, ZJ Wang - Journal of The Institution of Engineers (India): Series B, 2024 - Springer
52 天前 - … For example, IP-enabled sensors in medical sensor networks (MSNs) … Intrusion
detection based on the signal strength of the … Specifically, the detection system concentrates on …

Detection of Black Hole Attacks in Mobile Ad Hoc Networks Using Optimization-Based Routing Algorithms

D Sunitha, PH Latha - 2024 Third International Conference on …, 2024 - ieeexplore.ieee.org
56 天前 - … in MANET and secures the routing layer effectively. … needs to explored with wireless
sensor networks for environmental … detector system for resolving the optimization problem. …

Analysis of Decreased Rank Attack on RPL-Based IoT Networks

FV Nejad, MMG Sadeghi… - 2024 10th International …, 2024 - ieeexplore.ieee.org
58 天前 - security mechanisms for IoT networks by highlighting the high impact of the attack in
high-loss mobile networks… focus specifically on trusted secure routing to mitigate this attack. …

Lightweight Mitigation Against DIO Suppression Attack In RPL-Based IoT Networks

G Tahar, BAZ Eddine, B Djalila - … and Intelligent Systems (PAIS …, 2024 - ieeexplore.ieee.org
58 天前 - … within the IoT ecosystem arise during the routing process. … -based Intrusion Detection
System (IDS) to combat attacks … under attack, and Secured-RPL (ie, RPL under attack with …

Machine Learning Based Intelligent RPL Attack Detection System for IoT Networks

A Kannan, M Selvi, SVN Santhosh Kumar… - … Machine Learning with …, 2024 - Springer
59 天前 - … tags to the sensors in Wireless Sensor Networks (WSNs) … account by an intelligent
Intrusion Detection System (IDS) [… classifier for optimal routing in IoT based WSN by building …

[引用][C] Special issue on collaborative edge computing for secure and scalable Internet of Things

D Puthal, AK Mishra, SK Mishra - Software: Practice and …, 2024 - Wiley Online Library
65 天前 - … structured cluster routing protocol for load balanced wireless sensor networks
by … attacks in federated learning systems. The fourth paper titled “Decentralized identifier …

[HTML][HTML] HARVESTING BODY HEAT FOR REMOTE PULSE SENSOR MONITORING

M LAKHAL, M TMIMI, A IBRIZ, M BENSLIMANE… - Journal of Theoretical …, 2024 - jatit.org
66 天前 - … of the created breast cancer detection system was carefully … of network intrusion
detection. The performance of each … Opportunistic Routing (OR) in underwater sensor networks, …