Red kite optimization algorithm with average ensemble model for intrusion detection for secure IoT

FF Alruwaili, MM Asiri, FS Alrayes, SS Aljameel… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) based Wireless Sensor Networks (WSNs) contain
interconnected autonomous sensor nodes (SN), which wirelessly communicate with each …

[PDF][PDF] Design and implementation of intrusion detection systems using RPL and AOVD protocols-based wireless sensor networks

J Kipongo, TG Swart, E Esenogho - International Journal of …, 2023 - journals.pan.pl
Wireless Sensor Network (WSN) technology has grown in importance in recent years. All
WSN implementations need secure data transmission between sensor nodes and base …

Secure deep learning-based energy efficient routing with intrusion detection system for wireless sensor networks

M Sakthimohan, J Deny… - Journal of Intelligent & …, 2024 - content.iospress.com
In general, wireless sensor networks are used in various industries, including environmental
monitoring, military applications, and queue tracking. To support vital applications, it is …

Dynamic Network Intrusion Detection System for Virtual Machine Environment

G Kadiravan, P Sathish, D Preethi… - 2023 International …, 2023 - ieeexplore.ieee.org
The biggest issue right now is cloud security, which is why many experts have invested a lot
of time and energy into research and development over the past few years. Hackers could …

A review: The bibliometric analysis of emerging node localization in wireless sensor network

OJ Aroba, N Naicker, TT Adeliyi… - International Journal of …, 2023 - cspub-ijcisim.org
As research in Node localization in WSN becomes ubiquitous, there is a dire need to
interpret and map the increasing scientific knowledge and evolutionary trends so that a firm …

Enhanced seagull optimization based node localization scheme for wireless sensor networks

DL Balasubramanian… - International Journal of …, 2022 - search.proquest.com
Wireless sensor network (WSN) has become an emergent paradigm of networking and
computing. It uses several application domains like military, healthcare, surveillance, target …

Chapman Kolmogorov and Deep Recurrent Network Based Seamless Mobility for IOT Data Transmission in Wireless Network

S Reddy, N Thrimoorthy, G Kadiravan - 2023 - researchsquare.com
Next-generation wireless networks will be designed via all-IP-based network framework that
ensures seamless mobility and universal access to Internet via wireless networks. Also over …