2020
DOI: 10.1002/ett.3997
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system

Abstract: Wireless sensor network (WSN) is a collection of a huge number of autonomous sensor nodes having capabilities such as sensing, processing, and manipulation.In any WSN, routing protocols are the backbone for performing all type tasks such as sensing, controlling, and transmission of packets in ubiquitous environment. In this article, a LEACH protocol with Levenberg-Marquardt neural network (LEACH-LMNN) is considered to analyze the overall network lifetime. The aim of LEACH-LMNN protocol comprises two parts: sel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 88 publications
(55 citation statements)
references
References 59 publications
0
55
0
Order By: Relevance
“…RNN normally can handle limited length sequences and will suffer from short‐term memory if the sequence length is long 87 . Different RNN variants like Long short‐term memory (LSTM) 88 and gated recurrent unit (GRU) 89,90 are proposed to solve these issues.…”
Section: Ai Methods For Nidsmentioning
confidence: 99%
“…RNN normally can handle limited length sequences and will suffer from short‐term memory if the sequence length is long 87 . Different RNN variants like Long short‐term memory (LSTM) 88 and gated recurrent unit (GRU) 89,90 are proposed to solve these issues.…”
Section: Ai Methods For Nidsmentioning
confidence: 99%
“…Machine learning is one of the popular fields of artificial intelligence that is successfully used in solving various computational problems of different areas [56,57]. Now a days it is extended to more deep networks such as deep learning [58], extreme learning [59], deep extreme learning networks etc.…”
Section: Machine Learning Methodsmentioning
confidence: 99%
“…As can be seen from Figure 6, r(d) can embody the characteristics of LDoS attack. erefore, attacks in TCP background traffic can be detected by extracting LDoS attack features (such as T and L) from the r(d) sequence [33][34][35].…”
Section: Detection Methods Summarymentioning
confidence: 99%