A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

[PDF][PDF] Fortifying IoT against crimpling cyber-attacks: a systematic review

U Tariq, I Ahmed, MA Khan, AK Bashir - Karbala International Journal of …, 2023 - iasj.net
The rapid growth and increasing demand for Internet of Things (IoT) devices in our everyday
lives create exciting opportunities for human involvement, data integration, and seamless …

A reinforcement learning based routing protocol for software-defined networking enabled wireless sensor network forest fire detection

N Moussa, E Nurellari, K Azbeg, A Boulouz… - Future Generation …, 2023 - Elsevier
Abstract Critical event reporting Wireless Sensor Networks (WSNs) applications need vital
requirements (extended network lifetime, reliability, real time responsiveness, and …

Energy efficient secure-trust-based ring cluster routing in wireless sensor network

JJ Sumesh, CP Maheswaran - Journal of Interconnection Networks, 2023 - World Scientific
Typically, wireless sensor networks (WSNs) are used to monitor as well as detect different
kinds of objects in realistic monitoring, where security remains as a major confront …

Double Q‐learning‐based adaptive trajectory selection for energy‐efficient data collection in wireless sensor networks

V Rajagopal, B Velusamy… - International Journal of …, 2023 - Wiley Online Library
This paper proposes a novel distributed stochastic routing strategy using mobile sink based
on double Q‐learning algorithm to improve the network performance in wireless sensor …

Comprehensive review on distributed denial of service attacks in wireless sensor networks

S Subramani, M Selvi - International Journal of Information …, 2023 - inderscienceonline.com
Distributed denial of service (DDoS) is the most popular disruptive type of attack in wireless
sensor networks (WSNs). It is extremely harmful for the functioning of the network, since it …

NEECH: new energy-efficient algorithm based on the best cluster head in wireless sensor networks

AA Baradaran, F Rabieefar - Iranian Journal of Science and Technology …, 2023 - Springer
One of the main issues in wireless sensor networks is the network lifetime. Sending data
collected through nodes in the WSN results in more energy drain. Repeating this procedure …

Trust aware secured energy efficient fuzzy clustering-based protocol in wireless sensor networks

B Kranthikumar, R Leela Velusamy - Soft Computing, 2023 - Springer
Abstract Recent advancements in Wireless Sensor Networks (WSNs) have generated
interest in the field of sensor tracking events. Environment monitoring is one of the most …

Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles

S Rajasoundaran, SVNS Kumar, M Selvi… - Peer-to-Peer Networking …, 2023 - Springer
Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles
(UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs …

Real-Time Data Transmission with Data Carrier Support Value in Neighbor Strategic Collection in WSN.

S Ponnarasi, T Rajendran - Computers, Materials & Continua, 2023 - search.ebscohost.com
An efficient trust-aware secure routing and network strategy-based data collection scheme is
presented in this paper to enhance the performance and security of wireless sensor …