Machine learning for advanced wireless sensor networks: A review

T Kim, LF Vecchietti, K Choi, S Lee… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are typically used with dynamic conditions of task-related
environments for sensing (monitoring) and gathering of raw sensor data for subsequent …

AI-based wormhole attack detection techniques in wireless sensor networks

M Hanif, H Ashraf, Z Jalil, NZ Jhanjhi, M Humayun… - Electronics, 2022 - mdpi.com
The popularity of wireless sensor networks for establishing different communication systems
is increasing daily. A wireless network consists of sensors prone to various security threats …

A hybrid wormhole attack detection in mobile ad-hoc network (MANET)

M Tahboush, M Agoyi - IEEE Access, 2021 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANET) are decentralized wireless networks that communicate
without pre-existing infrastructure. MANETs are vulnerable to the most popular types of …

[PDF][PDF] Energy optimised security against wormhole attack in iot-based wireless sensor networks

H Shahid, H Ashraf, H Javed, M Humayun… - Comput. Mater …, 2021 - cdn.techscience.cn
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the
data and share it with the central repositories. These sensors are battery-driven and …

Trust based secure and energy efficient routing protocol for wireless sensor networks

H Hu, Y Han, M Yao, X Song - IEEE access, 2021 - ieeexplore.ieee.org
Due to the characteristics of limited resources and dynamic topology, wireless sensor
networks (WSNs) are facing two major problems: security and energy consumption …

Centralized routing protocol for detecting wormhole attacks in wireless sensor networks

OR Ahutu, H El-Ocla - IEEE Access, 2020 - ieeexplore.ieee.org
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because
they are generally batteries powered and therefore have limited computational capability …

Wireless sensor network for forest fire detection

N Varela, A Ospino, NAL Zelaya - Procedia Computer Science, 2020 - Elsevier
Some methods for fire detection include monitoring from watch towers and the use of
satellite images [1][2]. Unfortunately, these are not efficient due to several reasons, such as …

A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks

M Ezhilarasi, L Gnanaprasanambikai, A Kousalya… - Soft Computing, 2023 - Springer
The application of wireless sensor networks is not limited to a particular domain. Technology
advancements result in innovative solutions for simple communication to large applications …

ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4. 5 and CART classifiers

P Gite, K Chouhan, KM Krishna, CK Nayak… - Materials Today …, 2023 - Elsevier
A key component for preserving a WSN's integrity is designing an intrusion detection system
(IDS). This article covers several sorts of security threats that may occur in a WSN. It …

A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks

L Yang, Y Lu, SX Yang, T Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Security is one of the major concerns in industrial wireless sensor networks (IWSNs). To
assure the security in clustered IWSNs, this article presents a secure clustering protocol with …