A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks

L Yang, Y Lu, SX Yang, T Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… of our secure clustering protocol in terms of number of malicious clusters, number of … outlier
detection scheme, respectively. In Section VII, the details of our secure clustering protocol are …

An evolutionary game-based secure clustering protocol with fuzzy trust evaluation and outlier detection for wireless sensor networks

L Yang, Y Lu, SX Yang, Y Zhong, T Guo… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
… Our fuzzy trust evaluation method and outlier detection scheme are presented in … clustering
protocol is proposed in section VI. We verify the performance of our secure clustering protocol

[PDF][PDF] Outlier detection in clustering

S Cherednichenko - … Thesis, University of Joensuu, Department of …, 2005 - cs.joensuu.fi
… In Section 2, we present definition of clustering and general classification of clustering
algorithms. In Section 3, we consider outlier detection methods in details, given classification by …

Outlier detection for wireless sensor networks using density‐based clustering approach

A Abid, A Kachouri, A Mahfoudhi - IET Wireless Sensor …, 2017 - Wiley Online Library
… Energy Adaptive Clustering Hierarchy protocol under NS… clustering theory and methods is
exposed followed by development of our proposed our solution as conceived to detect outliers

Outlier detection techniques for wireless sensor networks: A survey

Y Zhang, N Meratnia, P Havinga - … communications surveys & …, 2010 - ieeexplore.ieee.org
… Krishnamachari and Iyengar [15] propose a distributed Bayesian protocol to detectoutliers
if they do not belong to clusters or if their clusters are significantly smaller than other clusters. …

[HTML][HTML] Outlier detection strategies for WSNs: A survey

B Chander, G Kumaravelan - Journal of King Saud University-Computer …, 2022 - Elsevier
clustering approaches detect outliers with a hard decision. Outlier Score - an outlier detection
technique with an outlier … , routing, cluster head selection, and MAC protocols by making …

Outlier detection approaches for wireless sensor networks: A survey

A Ayadi, O Ghorbel, AM Obeid, M Abid - Computer Networks, 2017 - Elsevier
… purposes such as classification, clustering and outlier detection where a data instance …
aggregation, routing, MAC protocols, and QoS and recently outlier detection. Liang and Wang [78] …

Trust-based cluster head validation and outlier detection technique for mobile wireless sensor networks

M Sutaone, P Mukherj… - … Conference on Wireless …, 2016 - ieeexplore.ieee.org
protocol with intrusion detection relying on clustering WSN architecture utilizing an energy
prediction model for detecting attacks in cluster … proposed an intrusion detection scheme using …

Network anomaly detection in time series using distance based outlier detection with cluster density analysis

K Flanagan, E Fallon, P Connolly… - … and Applications (ITA), 2017 - ieeexplore.ieee.org
detection techniques to detect possible malicious activity on a network. This paper proposes
an evolution of the MCOD (Micro-Clustering Outlier Detection) … Port numbers and protocol

Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN

K Thangaramya, K Kulothungan, S Indira Gandhi… - Soft Computing, 2020 - Springer
outlier detection algorithm is also proposed in this paper for distinguishing the malicious nodes
from other nodes within each cluster … , intelligent cluster-based routing protocols are able …