Node replication attack detection in distributed wireless sensor networks
Wireless sensor network (WSN) is an emerging technology used in emergency scenarios.
There are a number of possible threats to WSNs because they use unsupervised IP …
There are a number of possible threats to WSNs because they use unsupervised IP …
Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks
Fifth Generation (5G) security principles are widely expected with effective cryptography
models, information security models, Machine Learning (ML) based Intrusion Detection …
models, information security models, Machine Learning (ML) based Intrusion Detection …
Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey
GH Adday, SK Subramaniam, ZA Zukarnain… - IEEE …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) serve as the backbone for the Internet of Things (IoT) and
smart cities, enabling the gathering of essential data and vital information. The widespread …
smart cities, enabling the gathering of essential data and vital information. The widespread …
Reinforcement learning rebirth, techniques, challenges, and resolutions
Reinforcement learning (RL) is a new propitious research space that is well-known
nowadays on the internet of things (IoT), media and social sensing computing are …
nowadays on the internet of things (IoT), media and social sensing computing are …
An IoT‐Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing
Y Sabri, A Hilmani - Transactions on Emerging …, 2024 - Wiley Online Library
The security principles of the fifth generation (5G) are anticipated to include robust
cryptography models, information security models, and machine learning (ML) powered …
cryptography models, information security models, and machine learning (ML) powered …
A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information
Node replication attack (also known as replica attack) is one of the common attacks in
Wireless Sensor Networks (WSNs). In this attack, the adversary captures the sensor node (s) …
Wireless Sensor Networks (WSNs). In this attack, the adversary captures the sensor node (s) …
Security Attacks, Requirements and Simulative Analysis of QoS in WSN
The objective of a routing protocol for wireless sensor network is to ensure availability of
messages, authentication and integrity. Most of the existing secure routing algorithms for …
messages, authentication and integrity. Most of the existing secure routing algorithms for …
[PDF][PDF] REPEATED NODE BEHAVIOUR ANALYSIS WITH NODE TRANSMISSION PATTERN ANALYSIS BASED BEHAVIORAL INDEX FOR FALSE ALARM …
DMK REDDY, DRR SATHYA, DRV LAKSHMI - Journal of Theoretical and …, 2023 - jatit.org
Multiple types of sensor failures and inaccurate readings can compromise the integrity of a
Wireless Sensor Network (WSN). The inability to quickly and accurately respond to …
Wireless Sensor Network (WSN). The inability to quickly and accurately respond to …
Malicious vehicle node detection mechanism based on repeated game and trust evaluation in VANET
Y Zhu, Y Wang - Journal of Physics: Conference Series, 2020 - iopscience.iop.org
In order to solve the problem of malicious vehicle nodes attack in VANET system and
improve the security of VANET communication, the paper proposes a method of malicious …
improve the security of VANET communication, the paper proposes a method of malicious …
Advanced extremely efficient detection of replica nodes in mobile wireless sensor networks
Today, wireless sensor networks (WSNs) are widely used in many applications including the
environment, military, and explorations. One of the most dangerous attacks against these …
environment, military, and explorations. One of the most dangerous attacks against these …