Lightweight real-time WiFi-based intrusion detection system using LightGBM

AA Bhutta, M Nisa, AN Mian - Wireless Networks, 2024 - Springer
Attacks on WiFi networks can cause network failures and denial of service for authentic
users. To identify such attacks, the deployment of a WiFi Intrusion Detection System (IDS) is …

Intrusion Detection System for Wireless Sensor Networks: A Machine Learning based Approach

H Sadia, S Farhan, YU Haq, R Sana, T Mahmood… - IEEE …, 2024 - ieeexplore.ieee.org
In this era, plenty of wireless devices are being used with the support of WI-FI (Wireless
Fidelity) and need to be maintained and authorized. Wireless Sensor Networks (WSN), a …

Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in wsn

S Ravindran - Peer-to-Peer Networking and Applications, 2024 - Springer
A wireless sensor network (WSN) is a distributed collection of tiny, low-power, wireless
devices which are deployed in a physical environment to monitor the various environmental …

BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques

J Xiao, C Li, Z Li, J Zhou - Scientific Reports, 2024 - nature.com
In this paper, we present a novel Secure Clustering Routing Method based on Blockchain
and Swarm Intelligence (BS-SCRM) for Wireless Sensor Networks (WSNs), which serves as …

MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks

Y Singh, NS Aulakh, IK Aulakh… - Peer-to-Peer Networking …, 2024 - Springer
Ensuring effective and reliable communication within underwater sensor networks (UWSNs)
is a formidable challenge due to their unique characteristics, which include offshore …

A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks

D Kalpana, P Ajitha - Peer-to-Peer Networking and Applications, 2024 - Springer
Diverse routing and security protocols are implemented to enhance the efficacy when
performing the packet transmission, however, finding the optimal path is highly challenging …

Performance Analysis of a WPCN-Based Underwater Acoustic Communication System

R Xing, Y Zhang, Y Feng, F Ji - Journal of Marine Science and …, 2023 - mdpi.com
Underwater acoustic communication (UWAC) has a wide range of applications, including
marine environment monitoring, disaster warning, seabed terrain exploration, and oil …

A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks

MA Khan, QN Naveed, A Lasisi, S Kaushik… - Wireless Personal …, 2024 - Springer
The decision-making process in Industrial Wireless Sensor Networks heavily relies on the
information provided by smart sensors. Ensuring the trustworthiness of these sensors is …

NHAPMAD: Novel hybrid approaches for privacy‐preserved multiple attacks detection

AD Seth, S Sharma, A Ratmele - … and Computation: Practice …, 2024 - Wiley Online Library
Detecting anomalies is crucial for maintaining security in Wireless Sensor Networks (WSNs),
as they are susceptible to various attacks that compromise nodes and yield inaccurate …

Towards improving the security of wireless networks using secured session keys

NGN Amma, T Jayaraj, NGB Amma - Information Security Journal …, 2024 - Taylor & Francis
Wireless Networks are mostly based on the IEEE 802.11 standards and with so many
applications being wireless, without proper security, sensitive information may be at risk …