2020
DOI: 10.1016/j.micpro.2020.103278
|View full text |Cite
|
Sign up to set email alerts
|

DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(49 citation statements)
references
References 25 publications
0
49
0
Order By: Relevance
“…It usually authenticate the sender for protection against the active attacks. The DLDM Framework structure [34] is used to identify the different kinds of DDoS attack effectively, thereby it improves the throughput and it also reduces the energy consumption. EPSM [35] is proposed to detect the wormhole attack and it also used to minimize the energy consumption and the overhead of the network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It usually authenticate the sender for protection against the active attacks. The DLDM Framework structure [34] is used to identify the different kinds of DDoS attack effectively, thereby it improves the throughput and it also reduces the energy consumption. EPSM [35] is proposed to detect the wormhole attack and it also used to minimize the energy consumption and the overhead of the network.…”
Section: Related Workmentioning
confidence: 99%
“…It also increases the lifetime of the network and increases the live nodes even after 450 rounds. The proposed method was evaluated and compared with the related DDoS detection strategies like the FLQL method [21], FSDNA [25], SACOP algorithm [29] and DLDMFS [34] rounds. But in the other related strategies, no more alive nodes available in 400 rounds that also affect the lifetime of the network.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…In this context, Figure 1 depicts the percentage of the security attacks collected from McAfee Labs in 2017, in which most of them are browser attacks, brute force attacks, and Distributed Denial of Service (DDoS) attacks [1], [2]. Also, several security attacks for the new computing environments such as WBANs [3]- [5], e-healthcare systems [6]- [8], fog computing [9], Mobile Edge Computing (MEC), Cloud Computing [10], [11], wireless sensor networks [12], [13], mobile ad hoc networks [14]- [16], and…”
Section: Introductionmentioning
confidence: 99%
“…As a result, a variety of techniques have been used to boost DoS detection efficiency using both active and passive methods. Supervised machine learning algorithms are one such technique used to predict and classify DoS and DDoS attacks [ 12 , 13 , 14 , 15 ]. Decision Tree (DT), Support Vector Machine (SVM), K-Nearest Neighbours (KNN), Deep-Learning (DL) classifier, and Naive Bayes (NB) are common algorithms for this purpose [ 16 ].…”
Section: Introductionmentioning
confidence: 99%
“…By summarizing previous studies and applications, we see that there has been an increase in the use of WSNs recently, that these devices play multiple roles, and the biggest challenges for WSNs remain security and energy. To overcome these challenges, several solutions that discuss data security performance problems have been proposed [ 10 , 11 , 12 , 13 , 15 , 35 , 36 ] that do not consider the impact on wireless power consumption. Moreover, other studies have discussed the concept of energy conservation from a data security-independent perspective [ 30 , 31 , 32 , 33 , 34 ].…”
Section: Introductionmentioning
confidence: 99%