Autonomous detection of malevolent nodes using secure heterogeneous cluster protocol

C Kotteeswaran, I Patra, R Nagaraju… - Computers and …, 2022 - Elsevier
Surfing of internet by the users has been more vital from the inception of the network.
However, the number of users using the internet is increasing gradually. As a result, it has …

Fuzzy optimization based detection of attacker nodes in wireless networks using deep neural network

J Daniel, JT Anita Rose… - Concurrency and …, 2022 - Wiley Online Library
Nowadays, information security attacks are emerging as the main threat to network behavior.
The deployment of sensor nodes in the open environment will be subjected to various kinds …

[引用][C] Enhanced Energy Efficient Routing in Wireless Sensor Network Using Modified Trust Based Leach Protocol