2021
DOI: 10.1007/s00500-021-06473-y
|View full text |Cite
|
Sign up to set email alerts
|

An intrusion detection system for wireless sensor networks using deep neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 23 publications
0
19
0
Order By: Relevance
“…The parameters such as precision and recall are comparatively shown in Figure 7. The results of existing methods are obtained from the previous work which was based on a Deep Neural Network (DNN) 25 . From the observations, it is clear that the presented optimized model performs better than the existing models.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The parameters such as precision and recall are comparatively shown in Figure 7. The results of existing methods are obtained from the previous work which was based on a Deep Neural Network (DNN) 25 . From the observations, it is clear that the presented optimized model performs better than the existing models.…”
Section: Resultsmentioning
confidence: 99%
“…Instead of selecting all the features, high‐ranked features are selected and processed to detect the intrusions. Though the presented approach improved the detection rate, it is not accurate since the minimum ranked features also produce some impacts in the intrusions 25–27 …”
Section: Related Workmentioning
confidence: 96%
See 1 more Smart Citation
“…The second section is devoted to the research on security enhancement. This section includes 8 research contributions, which discusses about: developing a secured and efficient data storage scheme for processing unstructured data in a hybrid cloud/edge environment (Vulapula and Valiveti 2022); proposing an accurate and complete approach for detecting and preventing assaults in cloud computing environment by utilizing both supervised and un-supervised machine learning techniques (Arunkumar and Ashok Kumar 2022); developing and deploying an intrusion detection system to detect cyber-physical attacks in the SCADA system by concatenating the convolutional neural network [CNN] and gated recurrent unit [GRU] as a collective approach (Diaba et al 2022); developing a novel intrusion detection system based on deep neural network (DNN) to find intrusions (Gowdhaman and Dhanapal 2021); proposing a modified device key generation algorithm (MDKGA) algorithm for establishing a secure communication between source and destination based on the QoS parameters (Gayathri et al 2021); proposing a f-slip model to address various attacks such as background knowledge attack, multiple sensitive attribute correlation attack, quasi-identifier correlation attack, non-membership correlation attack and membership correlation attack in 1:M dataset and the solutions for the attacks (Jayapradha and Prakash 2021); applying deep learning models to adaptively learn the attacks and classify them with higher accuracy (Jayabalan and Pugazendi 2021); and utilizing a novel Gaussian mixture design background subtraction methodology to detect objects mainly for enhancing the security of a provide cloud data center (Dhaya et al 2021).…”
Section: Editorialmentioning
confidence: 99%
“…An anomaly detection system detects by computing the deviations. Many attacks create a similar profile like normal nodes that show minimum deviation or zero deviation [9]. Many malicious samples are like normal samples.…”
Section: Introductionmentioning
confidence: 99%