Machine learning for coverage optimization in wireless sensor networks: a comprehensive review

OS Egwuche, A Singh, AE Ezugwu, J Greeff… - Annals of Operations …, 2023 - Springer
In the context of wireless sensor networks (WSNs), the utilization of artificial intelligence (AI)-
based solutions and systems is on the ascent. These technologies offer significant potential …

Blockchain‐Based Secure Localization against Malicious Nodes in IoT‐Based Wireless Sensor Networks Using Federated Learning

GG Gebremariam, J Panda… - … and mobile computing, 2023 - Wiley Online Library
Wireless sensor networks are the core of the Internet of Things and are used in healthcare,
locations, the military, and security. Threats to the security of wireless sensor networks built …

Ddos attack detection in wsn using modified bgru with mfo model

S Venkatasubramanian… - Advanced Applications of …, 2024 - igi-global.com
Significant challenges in the areas of energy and security persist for wireless sensor
networks (WSNs). Avoiding denial-of-service assaults is a priority for safeguarding WSN …

Detection of Denial-of-Service Attack in Wireless Sensor Networks: A lightweight Machine Learning Approach

MA Elsadig - IEEE Access, 2023 - ieeexplore.ieee.org
The characteristics and performance of wireless sensor networks (WSNs) are the main
reasons for their rapid expansion in various fields. However, these networks are extremely …

Artificial neural network-based mechanism to detect security threats in wireless sensor networks

S Khan, MA Khan, N Alnazzawi - Sensors, 2024 - mdpi.com
Wireless sensor networks (WSNs) are essential in many areas, from healthcare to
environmental monitoring. However, WSNs are vulnerable to routing attacks that might …

Detection and prevention of sinkhole attacks in MANETS based routing protocol using hybrid AdaBoost-Random forest algorithm

SSM Vincent, N Duraipandian - Expert Systems with Applications, 2024 - Elsevier
Abstract WSN (Wireless Sensor Network) is considered as one of the promising
technologies which are utilized in various fields for various applications. Along with it …

[PDF][PDF] Man-In-The Middle Attack Detection Scheme on Data Aggregation in Wireless Sensor Networks.

MI Adawy, M Tahboush, O Aloqaily… - International Journal of …, 2023 - researchgate.net
Abstract Wireless Sensor Networks (WSNs) consist of small devices, sensors, which are
deployed densely and arbitrarily in monitoring areas to gather information. Typically, the …

Improvement of amorphous localization algorithm in WSN using ALO and GWO

P Tripathy, PM Khilar - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
The process of node identification is referred to as localization, and it is rapidly gaining
popularity in the field of WSN. Different node identification processes have different findings …

A Survey of Heterogeneous Routing Protocols for Wireless Sensor Networks

S Kumar, J Prakash - 2023 7th International Conference on …, 2023 - ieeexplore.ieee.org
Over the last decade, wireless sensor networks (WSNs) have caused a lot of interest in
cellular or mobile computing research groups. Applications for WSN are numerous and …

Detection and prevention of sinkhole attacks in MANETS based routing protocol using hybrid AdaBoost-Random forest algorithm

SM VincentSherril - 2024 - dl.acm.org
Abstract WSN (Wireless Sensor Network) is considered as one of the promising
technologies which are utilized in various fields for various applications. Along with it …