2024
DOI: 10.1038/s41598-023-50554-x
|View full text |Cite
|
Sign up to set email alerts
|

Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection

M. Karthikeyan,
D. Manimegalai,
Karthikeyan RajaGopal

Abstract: A Wireless Sensor Network (WSN) aided by the Internet of Things (IoT) is a collaborative system of WSN systems and IoT networks are work to exchange, gather, and handle data. The primary objective of this collaboration is to enhance data analysis and automation to facilitate improved decision-making. Securing IoT with the assistance of WSN necessitates the implementation of protective measures to confirm the safety and reliability of the interconnected WSN and IoT components. This research significantly advanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(2 citation statements)
references
References 28 publications
0
1
0
Order By: Relevance
“…The process of data mining or data mining at the KDD stage can also be called text mining or text mining, because the data that researchers use is in the form of text, then at this stage, the Naive Bayes classifier algorithm is implemented for sentiment analysis of Mobile Passport application reviews (Karthikeyan et al, 2024). This stage is carried out after the data has passed the sentiment class labeling, this process is carried out by classification analysis, namely by making training data and testing data, then classifying with the Naive Bayes classifier algorithm and visualizing barplots and word clouds of the positive and negative words produced.…”
Section: Data Miningmentioning
confidence: 99%
“…The process of data mining or data mining at the KDD stage can also be called text mining or text mining, because the data that researchers use is in the form of text, then at this stage, the Naive Bayes classifier algorithm is implemented for sentiment analysis of Mobile Passport application reviews (Karthikeyan et al, 2024). This stage is carried out after the data has passed the sentiment class labeling, this process is carried out by classification analysis, namely by making training data and testing data, then classifying with the Naive Bayes classifier algorithm and visualizing barplots and word clouds of the positive and negative words produced.…”
Section: Data Miningmentioning
confidence: 99%
“…Network attack detection is one of the important means to ensure NIS, aiming to timely detect, identify, and respond to various network attack behaviors, ensuring the normal operation of network systems and the security of user data (Karthikeyan et al, 2024). With the rapid development of the internet and the continuous evolution of hacker attacks, network attacks have become more and more complex and hidden, posing a huge threat to network security.…”
Section: Feature Selectionmentioning
confidence: 99%