2023
DOI: 10.1109/access.2022.3228618
|View full text |Cite
|
Sign up to set email alerts
|

Abnormality Detection and Localization Schemes Using Molecular Communication Systems: A Survey

Abstract: Abnormality detection and localization (ADL) have been studied widely in wireless sensor networks (WSNs) literature, where the sensors use electromagnetic waves for communication. Molecular communication (MC) has been introduced as an alternative approach for ADL in particular areas such as healthcare, being able to tackle the shortcomings of conventional WSNs, such as invasiveness, bioincompatibility, and high energy consumption. In this paper, we introduce a general framework for MCbased ADL, which consists … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 201 publications
0
6
0
Order By: Relevance
“…Reducing human intervention during feature selection, the framework decreased system complexity for future adoption in 5G IoT networks to isolate traffic of interest. Etemadi et al [31] surveyed abnormality detection at the molecular communication level and compared different ML, heuristics, and DL primitives for this purpose. The work discussed the viability of ML approaches, as well as the utilization of naturally inspired systems based on genetic, particle swarm, and colony optimization algorithms for identifying anomalous (traffic) activity.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Reducing human intervention during feature selection, the framework decreased system complexity for future adoption in 5G IoT networks to isolate traffic of interest. Etemadi et al [31] surveyed abnormality detection at the molecular communication level and compared different ML, heuristics, and DL primitives for this purpose. The work discussed the viability of ML approaches, as well as the utilization of naturally inspired systems based on genetic, particle swarm, and colony optimization algorithms for identifying anomalous (traffic) activity.…”
Section: Related Workmentioning
confidence: 99%
“…Post-transformation dataset, therefore, results in a greater number of features due to one hot encoding of traffic class labeling. Compared to other nominal conversion schemes such as Bag-of-Word (BoW), and MinMaxScaling, one hot encoding provides a single-stage conversion suitable for BBI parameters relying on substantially lower computing capability favored in IoT environments [29,31]. The pre-processed dataset is subsequently input to neural algorithms using control variables described in the next sub-section.…”
Section: Loss Function = Categorical Cross-entropymentioning
confidence: 99%
See 2 more Smart Citations
“…Unique secret key generation [25] × Vulnerable to Stronger Attacker communications. This requires insertion, localization [32], evading anomaly detection [33], and tampering to be jointly successful. There are a myriad of detailed scenarios on how molecularbased IoNT systems can be attacked and we detail their corresponding recent research in Table I.…”
mentioning
confidence: 99%