2022
DOI: 10.3390/s22020410
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Multilevel Probabilistic Model for Abnormal Traffic Detection in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are low-cost, special-purpose networks introduced to resolve various daily life domestic, industrial, and strategic problems. These networks are deployed in such places where the repairments, in most cases, become difficult. The nodes in WSNs, due to their vulnerable nature, are always prone to various potential threats. The deployed environment of WSNs is noncentral, unattended, and administrativeless; therefore, malicious attacks such as distributed denial of service (DDoS) at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Early detection and elimination of cyber threats have become of the utmost importance in the contemporary world, be it individuals or mega-organisations dealing with electronic information and data. Adversaries no longer just rely on conventional attack strategies and are evolving over time, which brings about a need for us to develop and evolve the pre-existing defence action plans [119][120][121][122][123][124][125][126][127]. Through this paper, we tend to bring together the various approaches put forward in recent studies through AI-enabled techniques such as ML and DL to enhance a sense of security in mobile networks .…”
Section: Discussionmentioning
confidence: 99%
“…Early detection and elimination of cyber threats have become of the utmost importance in the contemporary world, be it individuals or mega-organisations dealing with electronic information and data. Adversaries no longer just rely on conventional attack strategies and are evolving over time, which brings about a need for us to develop and evolve the pre-existing defence action plans [119][120][121][122][123][124][125][126][127]. Through this paper, we tend to bring together the various approaches put forward in recent studies through AI-enabled techniques such as ML and DL to enhance a sense of security in mobile networks .…”
Section: Discussionmentioning
confidence: 99%
“…Defensive approaches against adversarial attacks on has also been studied recently [26,27]. Deep learning is also being actively researched on IoT, wireless sensor networks and edge devices [28][29][30].…”
Section: Related Workmentioning
confidence: 99%
“…• Third party vendors and open source software: To reduce the attack surface and increase the visibility of network, trusted, product specific whitelisting should be done. There is need for framework that includes end-end enhanced network monitoring and detection techniques [22]. The open source software used in ICS/ SCADA systems leads to ease of installations and extensibility of the performance of systems.…”
Section: Future Research Directionsmentioning
confidence: 99%