Node replication attack detection in distributed wireless sensor networks

L Sujihelen, R Boddu, S Murugaveni… - Wireless …, 2022 - Wiley Online Library
Wireless sensor network (WSN) is an emerging technology used in emergency scenarios.
There are a number of possible threats to WSNs because they use unsupervised IP …

Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks

S Rajasoundaran, AV Prabu, S Routray… - Computer …, 2022 - Elsevier
Fifth Generation (5G) security principles are widely expected with effective cryptography
models, information security models, Machine Learning (ML) based Intrusion Detection …

Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey

GH Adday, SK Subramaniam, ZA Zukarnain… - IEEE …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) serve as the backbone for the Internet of Things (IoT) and
smart cities, enabling the gathering of essential data and vital information. The widespread …

Reinforcement learning rebirth, techniques, challenges, and resolutions

W Shafik, M Matinkhah, P Etemadinejad… - … : International Journal on …, 2020 - joiv.org
Reinforcement learning (RL) is a new propitious research space that is well-known
nowadays on the internet of things (IoT), media and social sensing computing are …

An IoT‐Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing

Y Sabri, A Hilmani - Transactions on Emerging …, 2024 - Wiley Online Library
The security principles of the fifth generation (5G) are anticipated to include robust
cryptography models, information security models, and machine learning (ML) powered …

A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information

M Jamshidi, SSA Poor, A Arghavani, M Esnaashari… - Ad Hoc Networks, 2020 - Elsevier
Node replication attack (also known as replica attack) is one of the common attacks in
Wireless Sensor Networks (WSNs). In this attack, the adversary captures the sensor node (s) …

Security Attacks, Requirements and Simulative Analysis of QoS in WSN

PK Rai, AK Rai, V Rai, S Bhushan - Cyber Technologies and Emerging …, 2022 - Springer
The objective of a routing protocol for wireless sensor network is to ensure availability of
messages, authentication and integrity. Most of the existing secure routing algorithms for …

[PDF][PDF] REPEATED NODE BEHAVIOUR ANALYSIS WITH NODE TRANSMISSION PATTERN ANALYSIS BASED BEHAVIORAL INDEX FOR FALSE ALARM …

DMK REDDY, DRR SATHYA, DRV LAKSHMI - Journal of Theoretical and …, 2023 - jatit.org
Multiple types of sensor failures and inaccurate readings can compromise the integrity of a
Wireless Sensor Network (WSN). The inability to quickly and accurately respond to …

Malicious vehicle node detection mechanism based on repeated game and trust evaluation in VANET

Y Zhu, Y Wang - Journal of Physics: Conference Series, 2020 - iopscience.iop.org
In order to solve the problem of malicious vehicle nodes attack in VANET system and
improve the security of VANET communication, the paper proposes a method of malicious …

Advanced extremely efficient detection of replica nodes in mobile wireless sensor networks

M Safari, E Bahmani, M Jamshidi, A Shaltooki - JOIV: International Journal …, 2019 - joiv.org
Today, wireless sensor networks (WSNs) are widely used in many applications including the
environment, military, and explorations. One of the most dangerous attacks against these …