2023
DOI: 10.1016/j.micpro.2023.104888
|View full text |Cite
|
Sign up to set email alerts
|

Malicious attack detection based on continuous Hidden Markov Models in Wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 15 publications
0
0
0
Order By: Relevance
“…Deep learning models are not always suitable for dealing with the malicious activity of wireless networks. The work [ 17 ] shows the Hidden Markov Model (HMM) and Gaussian Mixture Model (GMM) stochastic assumptions outperform other machine learning models. Additionally, they also work on their own dataset.…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning models are not always suitable for dealing with the malicious activity of wireless networks. The work [ 17 ] shows the Hidden Markov Model (HMM) and Gaussian Mixture Model (GMM) stochastic assumptions outperform other machine learning models. Additionally, they also work on their own dataset.…”
Section: Related Workmentioning
confidence: 99%
“…The primary challenge in WSNs is the vulnerability of security protocols to various attacks, particularly sinkhole and wormhole attacks. These attacks can lead to serious consequences such as data tampering, unauthorized data access, and the disruption of network services [8,9]. Previous studies have proposed various security mechanisms, but many suffe high computational complexity and increased communication overhead [10].…”
Section: Introductionmentioning
confidence: 99%