GAFOR: genetic algorithm based fuzzy optimized re-clustering in wireless sensor networks

MK Shahzad, SMR Islam, M Hossain… - Mathematics, 2020 - mdpi.com
In recent years, the deployment of wireless sensor networks has become an imperative
requisite for revolutionary areas such as environment monitoring and smart cities. The en …

A secure routing scheme to mitigate attack in wireless adhoc sensor network

J Jasper - Computers & Security, 2021 - Elsevier
Due to the unattended nature and deployment of wireless sensors in the hostile
environment, the networks are vulnerable to carousal and stretch attack that causes Denial …

Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering …

LM Alkwai, AN Mohammed Aledaily… - Mathematical …, 2022 - Wiley Online Library
The most effective threat for wireless sensor networks (WSN) is Vampire attacks on sensor
nodes as they can stretch the network connectivity among them and influence the network's …

A mobile fuzzy sink scheme for wireless sensor network period improvement

W Shafik, SM Matinkhah… - 2020 8th Iranian Joint …, 2020 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN s) is considered to be a promising research area since it
entails sensing capabilities. WSN s are confronted by fabricated explosion injection attacks …

En‐Route Message Authentication Scheme for Filtering False Data in WSNs

C Yi - Security and Communication Networks, 2021 - Wiley Online Library
In wireless sensor networks, the adversary can easily control the compromised nodes to
inject false data reports. En‐route filtering is an effective mechanism to resist such attacks …

Detection and Mitigation of Vampire Attacks in Wireless Sensor Networks using Weighted Hopfield Neural Network with Nature Inspired Optimal Path Selection

S Famila, S Hariharan, N Sujaudeen… - … Conference on Self …, 2024 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of several nodes whose primary objectives are to
monitor and regulate surroundings. Furthermore, sensor nodes are distributed in …

[PDF][PDF] Research Article Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol …

LM Alkwai, ANM Aledaily, S Almansour, SD Alotaibi… - 2022 - academia.edu
Research Article Vampire Attack Mitigation and Network Performance Improvement Using
Probabilistic Fuzzy Chain Set with Authenti Page 1 Research Article Vampire Attack Mitigation …

[PDF][PDF] Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor Networks. Mathematics 2021, 9, 43

MK Shahzad, SMR Islam, M Hossain… - 2020 - core.ac.uk
In recent years, the deployment of wireless sensor networks has become an imperative
requisite for revolutionary areas such as environment monitoring and smart cities. The en …