2022
DOI: 10.1007/978-981-16-7985-8_36
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative Security Schemes for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…In this model, the vector encoding function is estimated at first by using the following model: (8) Where, indicates the hidden layer, K is the encoding function, denotes the weight matrix, and is the bias value. Consequently, the cost function is estimated, which is defined as the distance function between the input and -30 36 reconstructed data.…”
Section: Deep Auto Neural Network (Dann) Based Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this model, the vector encoding function is estimated at first by using the following model: (8) Where, indicates the hidden layer, K is the encoding function, denotes the weight matrix, and is the bias value. Consequently, the cost function is estimated, which is defined as the distance function between the input and -30 36 reconstructed data.…”
Section: Deep Auto Neural Network (Dann) Based Classificationmentioning
confidence: 99%
“…For evaluation, a thorough analysis is conducted to evaluate the performance and detection results of the proposed IPDO-DANN model. -30 31 reasons, including faulty hardware, software, node isolation, or environmental factors [7][8][9]. The WSNs' deployment in unsupervised situations raises the risk of attackers capturing nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Experimentation demonstrates that the proposed system effectively increases the probability of secure network routing paths while extending the network lifecycle. Among these, the black hole attack is one of the most severe threats to WSNs [3].…”
Section: Mitigation Of Black Hole and Selective Forwarding Attacks Th...mentioning
confidence: 99%
“…The data preprocessor module uses discrete pre-processors to process the data and transform it into the appropriate form. The reaction module is in charge of setting off the alert if any intrusion is discovered, and the intrusion model is the database of previously known intrusion characteristics [2].…”
Section: A Intrusion Detection Systemmentioning
confidence: 99%
“…Because of their action, an alarm is sent. Machine learning-based intrusion detection systems (IDS) are used to identify and prevent security breaches in wireless sensor networks [2].…”
Section: B Use Of Machine Learning Techniques In Wsn Securitymentioning
confidence: 99%