A comprehensive review on artificial intelligence/machine learning algorithms for empowering the future IoT toward 6G era

MR Mahmood, MA Matin, P Sarigiannidis… - IEEE …, 2022 - ieeexplore.ieee.org
The evolution of the wireless network systems over decades has been providing new
services to the users with the help of innovative network and device technologies. In recent …

Design Guidelines on Trust Management for Underwater Wireless Sensor Networks

R Zhu, A Boukerche, L Long… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In recent years, significant advancements in wireless underwater communication and
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …

Attack-defense evolutionary game strategy for uploading channel in consensus-based secondary control of islanded microgrid considering DoS attack

B Zhang, C Dou, D Yue, JH Park… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, with the development of communication technology and its application in
islanded microgrid, the pure power grid has gradually become a kind of cyber-physical …

Generative adversarial learning for trusted and secure clustering in industrial wireless sensor networks

L Yang, SX Yang, Y Li, Y Lu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Traditional machine learning techniques have been widely used to establish the trust
management systems. However, the scale of training dataset can significantly affect the …

Galtrust: Generative adverserial learning-based framework for trust management in spatial crowdsourcing drone services

J Akram, A Anaissi, RS Rathore… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
In the evolving landscape of consumer electronics, the Generative Adversarial Learning-
based Trust Management (GALTrust) framework emerges as a novel solution, uniquely …

Automation and orchestration of zero trust architecture: Potential solutions and challenges

Y Cao, SR Pokhrel, Y Zhu, R Doss, G Li - Machine Intelligence Research, 2024 - Springer
Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and
access resources. ZTA is non-perimeter-based defence, which has been emerging as a …

Selfish node detection by modularized deep nmf autoencoder based incentivized reputation scheme

R Sharma, SK Dinkar - Cybernetics and Systems, 2023 - Taylor & Francis
Delay tolerant network is a boon in emergency fields like flood and war zones. The data
gathered by the sensor nodes is transmitted whenever any aggregator node comes in …

Detecting inaccurate sensors on a large-scale sensor network using centralized and localized graph neural networks

DY Wu, TH Lin, XR Zhang, CP Chen… - IEEE Sensors …, 2023 - ieeexplore.ieee.org
This article conducts an empirical study on detecting faulty sensors in a large-scale sensor
network containing approximately sensors distributed over. First, we discuss the practical …

Learning to identify malfunctioning sensors in a large-scale sensor network

TH Lin, XR Zhang, CP Chen, JH Chen… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
This paper proposes a two-stage methodology to discover malfunctioning sensors in an air
quality sensor network. The two-stage methodology consists of a supervised learner to …

BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques

J Xiao, C Li, Z Li, J Zhou - Scientific Reports, 2024 - nature.com
In this paper, we present a novel Secure Clustering Routing Method based on Blockchain
and Swarm Intelligence (BS-SCRM) for Wireless Sensor Networks (WSNs), which serves as …