Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)

M Abdan, SAH Seno - Wireless Communications and Mobile …, 2022 - Wiley Online Library
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …

A survey on node localization technologies in UWSNs: Potential solutions, recent advancements, and future directions

M Nain, N Goyal, SK Dhurandher… - International Journal …, 2024 - Wiley Online Library
Location‐based underwater communication applications such as strategic surveillance,
disaster prevention, marine research, and mine detection have given the field of underwater …

Wireless network upgraded with artificial intelligence on the data aggregation towards the smart internet applications

EB Priyanka, S Thangavel, KM Sagayam… - International Journal of …, 2022 - Springer
In the modern evolution, WSN (Wireless Sensor Network) incorporated with data
aggregation platform which involves stimulating research area with various modern …

A survey on security threats and network vulnerabilities in Internet of Things

HK Saini, M Poriye, N Goyal - Big Data Analytics in Intelligent IoT and …, 2023 - Springer
Abstract Internet of Things (IoT) is a group of physical objects like sensors and actuators etc.
connected through the network for dynamic exchange of information for augmenting the …

Emerging Data Aggregation State-of-Art Techniques with Comparative Analysis in UWSN

AM Pandith, N Goyal - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
Underwater Wireless Sensor Networks (UWSNs) carry out collaborative monitoring and data
gathering activities utilizing components like sensors and vehicles placed in a defined …

iWindCr field trial and electrochemical analysis for corrosion detection and monitoring offshore wind turbine's MP-TP steel components

S Simandjuntak, N Bausch, A Farrar… - Journal of Marine …, 2022 - Taylor & Francis
ABSTRACT A Proof-of-Concept (POC) low power-low current wireless sensor network
(WSN) for corrosion detection and monitoring of offshore wind turbine (OWT)'s component …

Sliding mode control for nonlinear semi-Markov jump systems with cyber attacks via fuzzy logic

P Yu, F **g, J Guo - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
This paper studies the security control problem of semi-Markov jump systems. First, the
parameter uncertainty, the time-varying delay, the nonlinear function and the cyber attack …

E-learning with Internet of Things: Architecture and Its Applications

A Kumar, S Sharma, S Dhawan, N Goyal… - Internet of …, 2022 - taylorfrancis.com
In the networking area, developments in technical e-learning can be referred to as the
Internet of Things (IoT). It is shown that it is now better to be associated with real-world affairs …

14 E-learning with

A Kumar, S Sharma, S Dhawan… - Internet of Things …, 2021 - books.google.com
The Internet of Things (IoT) is a common infrastructure that offers physical and virtual objects
for connectivity and collaboration. It increases in size and dimension as it progresses …

Internet of Underwater Things: Applications and Challenges

S Jain, N Yadav, M Husain, M Aggarwal, P Arya… - Internet of …, 2022 - taylorfrancis.com
The Internet of Underwater Things (IoUT) can be termed as a novel class of Internet of
Things (IoT), which is characterized as the organization of an intricate network of submerged …