Current trends in AI and ML for cybersecurity: A state-of-the-art survey

N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …

Trustworthy Localization in IoT Networks: A Survey of Localization Techniques, Threats, and Mitigation

G Pettorru, V Pilloni, M Martalò - Sensors, 2024 - mdpi.com
The Internet of Things (IoT) has revolutionized the world, connecting billions of devices that
offer assistance in various aspects of users' daily lives. Context-aware IoT applications …

Detection of Denial-of-Service Attack in Wireless Sensor Networks: A lightweight Machine Learning Approach

MA Elsadig - IEEE Access, 2023 - ieeexplore.ieee.org
The characteristics and performance of wireless sensor networks (WSNs) are the main
reasons for their rapid expansion in various fields. However, these networks are extremely …

[HTML][HTML] Towards a lightweight security framework using blockchain and machine learning

S Ismail, M Nouman, DW Dawoud, H Reza - Blockchain: Research and …, 2024 - Elsevier
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor
networks, necessitating the development of robust countermeasures tailored to their unique …

[HTML][HTML] Unified ensemble federated learning with cloud computing for online anomaly detection in energy-efficient wireless sensor networks

S Gayathri, D Surendran - Journal of Cloud Computing, 2024 - Springer
Abstract Anomaly detection in Wireless Sensor Networks (WSNs) is critical for their reliable
and secure operation. Optimizing resource efficiency is crucial for reducing energy …

Blockchain Based Multi-hop Routing and Cost-Effective Decentralized Storage System for Wireless Sensor Networks

M Faisal, G Husnain - Wireless Personal Communications, 2023 - Springer
Abstract In Wireless Sensor Networks, nodes have resource constraints such as storage
capacity, low energy, and computational power, etc. Due to which it directly affects the …

Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things

G Wang, Y Li, R Liu, F Tong, J Pan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Privacy-preserving localization plays a crucial role in enabling various applications on the
Internet of Things (IoT). Existing work applies random zero-sum noise to develop privacy …

Next-Generation Protection: Leveraging Federated Learning and Blockchain for Intrusion Detection in Smart Vehicle Network

JA Malik - Power System Technology, 2024 - powertechjournal.com
Smart Car's era ushers in new challenges, some of which are in the field of information
security such as wise cyber-attack prevention. Traditional IDS systems would lose …

Security Provisioning as Integrity in wireless sensor networks (WSN): A Survey

P Venkateswari… - 2023 14th International …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are composed of small sensory nodes with limited energy
that are deployed in large numbers in order to monitor a physical event in the area to be …

[HTML][HTML] A comprehensive review of energy efficient routing protocols for query driven wireless sensor networks

P Bekal, P Kumar, PR Mane, G Prabhu - F1000Research, 2023 - ncbi.nlm.nih.gov
In this current era of communications and networking, The Internet of things plays the main
role in the making of smart communication and networking. In this article, we have focused …