2023
DOI: 10.1016/j.aej.2022.10.033
|View full text |Cite
|
Sign up to set email alerts
|

Augmentation in performance and security of WSNs for IoT applications using feature selection and classification techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…Te main types of attacks in WSN networks are black hole attacks, gray hole attacks, fooding attacks, replay routing attacks, and wormhole attacks [39]. Te following four types of attacks are included in the NSL-KDD dataset: denial of service attacks (DoS) [40], snifng attacks (probe) [41], unauthorized access from a remote machine to a local machine (R2L) [42], and unauthorized access to local superuser (root) privileges (U2R) [43].…”
Section: Experimental Evaluation Methodsmentioning
confidence: 99%
“…Te main types of attacks in WSN networks are black hole attacks, gray hole attacks, fooding attacks, replay routing attacks, and wormhole attacks [39]. Te following four types of attacks are included in the NSL-KDD dataset: denial of service attacks (DoS) [40], snifng attacks (probe) [41], unauthorized access from a remote machine to a local machine (R2L) [42], and unauthorized access to local superuser (root) privileges (U2R) [43].…”
Section: Experimental Evaluation Methodsmentioning
confidence: 99%
“…The WSN has an issue of attacked possibility by a hacker to make a false diagnosis against reality's condition. The research that proposed by Yadav et al [15], is tried to detect pre-hacking that attempted to WSN peripherals by using an artificial intelligence of deep learning algorithm. Other research to secure the physical devices likes computing, network devices was also conducted [16].…”
Section: Study Literaturementioning
confidence: 99%
“…These techniques can adapt to changing network conditions and reduce power consumption when used together. Sensor nodes provide environmental parameters, battery status, and network behavior data to the AI-driven framework [1], [2].…”
Section: Introductionmentioning
confidence: 99%