Network traffic classifier with convolutional and recurrent neural networks for Internet of Things

M Lopez-Martin, B Carro, A Sanchez-Esguevillas… - IEEE …, 2017 - ieeexplore.ieee.org
A network traffic classifier (NTC) is an important part of current network monitoring systems,
being its task to infer the network service that is currently used by a communication flow (eg …

Improved deep convolutional neural network based malicious node detection and energy-efficient data transmission in wireless sensor networks

M Kumar, P Mukherjee, K Verma… - … on Network Science …, 2021 - ieeexplore.ieee.org
Wireless Sensors Networks (WSN) is the self-configured Wireless Ad hoc Networks
(WANET) for Internet of Things (IoT) which consists of a huge measure of resource …

Blockchain trust model for malicious node detection in wireless sensor networks

W She, Q Liu, Z Tian, JS Chen, B Wang, W Liu - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has been widely used because of its high efficiency and real-
time collaboration. A wireless sensor network is the core technology to support the operation …

[PDF][PDF] A review: secure routing protocols for mobile adhoc networks (MANETs)

S Kalime, K Sagar - Journal of Critical Reviews, 2021 - researchgate.net
Mobile Ad-hoc Network is a multi-hop wireless networking of mobile nodes that have
restricted resources by the conditions of battery life, memory, and processing power. The …

Exploiting trust for resilient hypothesis testing with malicious robots

M Cavorsi, OE Akgün, M Yemini… - … on Robotics and …, 2023 - ieeexplore.ieee.org
We develop a resilient binary hypothesis testing frame-work for decision making in
adversarial multi-robot crowdsensing tasks. This framework exploits stochastic trust …

Bayesian-inference-based sliding window trust model against probabilistic SSDF attack in cognitive radio networks

Y Fu, Z He - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Collaborative spectrum sensing as a promising approach is widely investigated for
identifying available spectrum in cognitive radio networks. However, such cooperation is …

Malicious node detection scheme based on correlation of data and network topology in fog computing-based vanets

K Gu, XY Dong, WJ Jia - IEEE Transactions on Cloud …, 2020 - ieeexplore.ieee.org
In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is
more likely to tamper with transferred data or provide false data easily. Because the …

Towards resilient and secure cooperative behavior of intelligent transportation system using sensor technologies

A Rehman, K Haseeb, T Saba, J Lloret… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) connects heterogeneous physical objects to collect the observing
data and eases to development of smart transmission systems. Vehicular ad hoc network …

Massive SSDF attackers identification in cognitive radio networks by using consistent property

Y Fu, Z He - IEEE Transactions on Vehicular Technology, 2023 - ieeexplore.ieee.org
To resist probabilistic spectrum sensing data falsification (SSDF) attacks in cognitive radio
networks (CRNs), we in this paper propose a simple and effective attacker identification …

A novel algorithm for improving malicious node detection effect in wireless sensor networks

H Yang, X Zhang, F Cheng - Mobile Networks and Applications, 2021 - Springer
As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at
risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node …