Lightweight real-time WiFi-based intrusion detection system using LightGBM

AA Bhutta, M Nisa, AN Mian - Wireless Networks, 2024 - Springer
Attacks on WiFi networks can cause network failures and denial of service for authentic
users. To identify such attacks, the deployment of a WiFi Intrusion Detection System (IDS) is …

Intrusion Detection System for Wireless Sensor Networks: A Machine Learning based Approach

H Sadia, S Farhan, YU Haq, R Sana, T Mahmood… - IEEE …, 2024 - ieeexplore.ieee.org
In this era, plenty of wireless devices are being used with the support of WI-FI (Wireless
Fidelity) and need to be maintained and authorized. Wireless Sensor Networks (WSN), a …

[HTML][HTML] BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques

J Xiao, C Li, Z Li, J Zhou - Scientific Reports, 2024 - nature.com
In this paper, we present a novel Secure Clustering Routing Method based on Blockchain
and Swarm Intelligence (BS-SCRM) for Wireless Sensor Networks (WSNs), which serves as …

A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks

D Kalpana, P Ajitha - Peer-to-Peer Networking and Applications, 2024 - Springer
Diverse routing and security protocols are implemented to enhance the efficacy when
performing the packet transmission, however, finding the optimal path is highly challenging …

[HTML][HTML] Performance Analysis of a WPCN-Based Underwater Acoustic Communication System

R Xing, Y Zhang, Y Feng, F Ji - Journal of Marine Science and …, 2023 - mdpi.com
Underwater acoustic communication (UWAC) has a wide range of applications, including
marine environment monitoring, disaster warning, seabed terrain exploration, and oil …

Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN

S Ravindran - Peer-to-Peer Networking and Applications, 2024 - Springer
A wireless sensor network (WSN) is a distributed collection of tiny, low-power, wireless
devices which are deployed in a physical environment to monitor the various environmental …

Towards improving the security of wireless networks using secured session keys

NGN Amma, T Jayaraj, NGB Amma - Information Security Journal …, 2024 - Taylor & Francis
Wireless Networks are mostly based on the IEEE 802.11 standards and with so many
applications being wireless, without proper security, sensitive information may be at risk …

Intrusion Detection Systems and its application in latest Networking Technologies–A Survey

K Shanthi, R Maruthi - Educational Administration: Theory and Practice, 2024 - kuey.net
The attackers are using different techniques to intrude themselves into the network or system
to steal our data. The intruding techniques are increasing day by day and it is very difficult to …

The Optimisation of Communication in Power Carrier Sensor Control Networks Using the Ant Colony Algorithm

J Hou - Proceedings of the 6th International Conference on …, 2023 - dl.acm.org
The aim of this study is to optimise power carrier sensor control network communication
through the application of ant colony algorithm in order to improve energy utilisation …

NHAPMAD: Novel hybrid approaches for privacy‐preserved multiple attacks detection

AD Seth, S Sharma, A Ratmele - Concurrency and Computation … - Wiley Online Library
Detecting anomalies is crucial for maintaining security in Wireless Sensor Networks (WSNs),
as they are susceptible to various attacks that compromise nodes and yield inaccurate …