WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues

J Amutha, S Sharma, J Nagar - Wireless Personal Communications, 2020 - Springer
Wireless sensor networks (WSNs) are growing rapidly in various fields of commerce,
medicine, industrial, agriculture, research, meteorology, etc. that eases complicated tasks …

Software-defined wireless sensor networks: A survey

H Mostafaei, M Menth - Journal of Network and Computer Applications, 2018 - Elsevier
Software-defined networking (SDN) decouples data and control plane, ie, forwarding
elements are remotely configured by centralized controllers instead through distributed …

[Retracted] IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security

CH Cao, YN Tang, DY Huang… - Security and …, 2021 - Wiley Online Library
Wireless sensor networks (WSN) have problems such as limited power, weak computing
power, poor communication ability, and vulnerability to attack. However, the existing …

AutoML-ID: Automated machine learning model for intrusion detection using wireless sensor network

A Singh, J Amutha, J Nagar, S Sharma, CC Lee - Scientific reports, 2022 - nature.com
Momentous increase in the popularity of explainable machine learning models coupled with
the dramatic increase in the use of synthetic data facilitates us to develop a cost-efficient …

Energy efficient scheme for better connectivity in sustainable mobile wireless sensor networks

S Sachan, R Sharma, A Sehgal - Sustainable Computing: Informatics and …, 2021 - Elsevier
The extreme issues related to energy consumption and connectivity within the network in
mobile wireless sensor network indulges so many researchers to find out the optimal …

A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks

A Singh, J Amutha, J Nagar, S Sharma - Expert Systems with Applications, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) is a promising technology with enormous
applications in almost every walk of life. One of the crucial applications of WSNs is intrusion …

LT-FS-ID: Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the k-Barriers for Intrusion Detection Using …

A Singh, J Amutha, J Nagar, S Sharma, CC Lee - Sensors, 2022 - mdpi.com
The dramatic increase in the computational facilities integrated with the explainable
machine learning algorithms allows us to do fast intrusion detection and prevention at …

Learning-automata-based confident information coverage barriers for smart ocean Internet of Things

X Deng, Y Jiang, LT Yang, L Yi, J Chen… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
As an emerging network paradigm, the Internet of Things (IoT) which consists of a significant
number of multifunctional and heterogeneous IoT nodes has attracted dramatic attentions …

Improved DV-hop localization algorithm based on dynamic anchor node set for wireless sensor networks

Y Cao, Z Wang - IEEE access, 2019 - ieeexplore.ieee.org
Node localization is a key issue in wireless sensor networks (WSN) area, and distance
vector hop (DV-Hop) algorithm is widely adopted in WSN localization. Existing DV-Hop …

Formal verification approaches in the web service composition: a comprehensive analysis of the current challenges for future research

A Souri, AM Rahmani… - International journal of …, 2018 - Wiley Online Library
Today, service composition is emerging paradigm on the communication networks such as
cloud environments, internet of things, wireless sensor network, and software‐defined …