Trust based secure and energy efficient routing protocol for wireless sensor networks

H Hu, Y Han, M Yao, X Song - IEEE access, 2021 - ieeexplore.ieee.org
Due to the characteristics of limited resources and dynamic topology, wireless sensor
networks (WSNs) are facing two major problems: security and energy consumption …

A dual cluster-head energy-efficient routing algorithm based on canopy optimization and K-means for WSN

M Wu, Z Li, J Chen, Q Min, T Lu - Sensors, 2022 - mdpi.com
Wireless sensor networks (WSN) are widely used in various applications, such as
environmental monitoring, healthcare, event detection, agriculture, disaster management …

A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network

B Pang, Z Teng, H Sun, C Du, M Li… - IEEE wireless …, 2021 - ieeexplore.ieee.org
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several
threats, one of which is dishonest recommendation attacks providing false trust values that …

Energy-efficient fuzzy management system for internet of things connected vehicular ad hoc networks

I Memon, MK Hasan, RA Shaikh, J Nebhen, KAA Bakar… - Electronics, 2021 - mdpi.com
Many algorithms use clustering to improve vehicular ad hoc network performance. The
expected points of many of these approaches support multiple rounds of data to the …

Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks

S Rajasoundaran, SVNS Kumar, M Selvi… - Wireless …, 2021 - Springer
Abstract Wireless Sensor Networks (WSNs) contain multiple wireless sensor nodes
deployed around the geographical locations. The WSN used in military applications need …

Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network

S Subramani, M Selvi - Neural Computing and Applications, 2023 - Springer
The intrusion detection systems (IDSs) developed based on classification algorithms for
securing wireless sensor networks (WSNs) are unable to attain the required detection …

Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN

SG Qureshi, SK Shandilya - Wireless personal communications, 2022 - Springer
Various sensor nodes are interconnected with each other in wireless sensor network (WSN).
WSN communicates to every node within the network wirelessly to collect data regarding the …

Attribute granules-based object entropy for outlier detection in nominal data

C Liu, D Peng, H Chen, Z Yuan - Engineering Applications of Artificial …, 2024 - Elsevier
Abstract Concept lattice theory, which is one of the key mathematical models of granular
computing, is capable of successfully dealing with uncertain information in nominal data. It …

An evolutionary game-based secure clustering protocol with fuzzy trust evaluation and outlier detection for wireless sensor networks

L Yang, Y Lu, SX Yang, Y Zhong, T Guo… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Trustworthy and reliable data delivery is a challenging task in Wireless Sensor Networks
(WSNs) due to unique characteristics and constraints. To acquire secured data delivery and …

Advanced multi-hop clustering (AMC) in vehicular ad-hoc network

A Katiyar, D Singh, RS Yadav - Wireless Networks, 2022 - Springer
Clustering improves network stability and scalability significantly by efficiently handling the
fast topological change in VANET. Multi-hop clustering is introduced in VANET to handle …