Abstract Internet of Things (IoT) utilization is increasing every day in both industry and other applications recently. However, the IoT communication is under security threats from …
S Subramani, M Selvi - International Journal of Information …, 2023 - inderscienceonline.com
Distributed denial of service (DDoS) is the most popular disruptive type of attack in wireless sensor networks (WSNs). It is extremely harmful for the functioning of the network, since it …
S Subramani, M Selvi - Neural Computing and Applications, 2023 - Springer
The intrusion detection systems (IDSs) developed based on classification algorithms for securing wireless sensor networks (WSNs) are unable to attain the required detection …
Cooperation among sensor nodes is always essential for achieving reliable data dissemination in Wireless Sensor Network (WSNs). The sensor nodes can cat as a host or a …
In 5G and beyond, the figure of cross-operator/domain connections and relationships grows exponentially among stakeholders, resources, and services, with reputation-based trust …
Z He, L Chen, F Li, G Jin - Plos one, 2023 - journals.plos.org
WSN is one of the most efficient technologies in intelligent communication and because of its advantages, this technology has been utilized in various applications. By using WSNs …
M Biradar, B Mathapathi - Journal of Interconnection Networks, 2023 - World Scientific
One of the significant approaches in implementing the routing of WSNs is clustering that leads to scalability and extending of network lifetime. In the clustered WSN, cluster heads …
Smart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with …
CR Swaroop, K Raja - International Journal of Computers and …, 2023 - Taylor & Francis
In recent years, outlier detection has attained great attention with machine learning techniques due to its wide range of applications. By considering the input data's distributive …