Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation

RB Kagade, S Jayagopalan - International Journal of Network …, 2022 - Wiley Online Library
Nowadays, owing to the openness of transmission medium, wireless sensor networks
(WSNs) suffer from a variety of attacks, together with DoS attacks, tampering attacks …

An efficient deep learning-based solution for network intrusion detection in wireless sensor network

HS Sharma, A Sarkar, MM Singh - International Journal of System …, 2023 - Springer
This paper introduces a unique intrusion detection method that integrates developmental
and operational frameworks, focusing specifically on the wireless sensor network. With the …

Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN

R Das, M Dwivedi - Journal of Reliable Intelligent Environments, 2024 - Springer
The widespread use of hierarchical wireless sensor networks (HWSN) in various industries,
including environmental monitoring, healthcare, and intrusion detection, has made the …

Non‐zero‐sum game‐based trust model to enhance wireless sensor networks security for IoT applications

MS Abdalzaher, L Samy, O Muta - IET Wireless Sensor Systems, 2019 - Wiley Online Library
Nowadays, trust models of wireless sensor networks (WSNs) security have flourished due to
the day‐to‐day attack challenges, which are most popular for internet of things (IoT). This …

A weight optimized deep learning model for cluster based intrusion detection system

S Godala, MS Kumar - Optical and Quantum Electronics, 2023 - Springer
In wireless sensor networks (WSNs), the implemented conventional intrusion detection
frame works need more energy and computation time, which impact the overall WSNs …

Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach

R Rani, S Kumar, U Dohare - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote
environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes …

An energy aware secure three-level weighted trust evaluation and grey wolf optimization based routing in wireless ad hoc sensor network

RI Sajan, VB Christopher, MJ Kavitha, TS Akhila - Wireless Networks, 2022 - Springer
Due to the widespread application of wireless sensor networks in fields such as healthcare,
the battlefield, etc., security has become a prime concern for transmitting information without …

A deep reinforcement learning based intrusion detection system (drl-ids) for securing wireless sensor networks and internet of things

H Benaddi, K Ibrahimi, A Benslimane… - Wireless Internet: 12th EAI …, 2020 - Springer
Many modern infrastructures incorporate a number of sensors and actuators interconnected
via wireless links using Wireless Sensor Network (WSN) and Internet of Things (IoT) …

Intrusion detection via optimal tuned LSTM model with trust and risk level evaluation

RB Kagade, N Vijayaraj - International Journal of Bio …, 2024 - inderscienceonline.com
Different heterogeneous wireless sensor networks (WSNs) linked with the cloud platform
make up a sensor cloud framework. The optimal cluster head (CH) is chosen from among …

TRUST‐based features for detecting the intruders in the Internet of Things network using deep learning

HN Bhor, M Kalla - Computational Intelligence, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) is a trending domain and has acquired much interest for
various kinds of civilian applications. The purpose of IoT is to make objects accessible and …