2021 International Conference on Industrial Electronics Research and Applications (ICIERA) 2021
DOI: 10.1109/iciera53202.2021.9726753
|View full text |Cite
|
Sign up to set email alerts
|

Secure Intrusion Detection System for Hierarchically Distributed Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Several existing approaches are considered for comparison, including EPK‐DNN, 16 IMOPSO, 17 AIDS‐HML, 19 PSO+KNN, 20 PSO+ANN, 20 FSACM, 21 LightGBM‐DAE, 22 HTF‐DS, 24 DHMLM, 25 SGM, 26 and HDL 27 using NADS datasets.…”
Section: Discussion On Simulation Outcomesmentioning
confidence: 99%
See 1 more Smart Citation
“…Several existing approaches are considered for comparison, including EPK‐DNN, 16 IMOPSO, 17 AIDS‐HML, 19 PSO+KNN, 20 PSO+ANN, 20 FSACM, 21 LightGBM‐DAE, 22 HTF‐DS, 24 DHMLM, 25 SGM, 26 and HDL 27 using NADS datasets.…”
Section: Discussion On Simulation Outcomesmentioning
confidence: 99%
“…Nonetheless, the loss rate and training time of this approach were high. Advanced Intrusion Detection Systems with Hybrid ML (AIDS‐HML) in wireless sensor networks were developed by Gebremariam GG et al 19 utilizing hybrid ML techniques to identify and classify attacks. The system involves trained and evaluated forecast models within the classifiers.…”
Section: Reviewmentioning
confidence: 99%
“…Feature importance analysis is crucial for understanding the impact of different input features on the prediction of barrier counts [ 7 ]. We employ the Random Forest Regressor to extract and rank the importance of features to identify the most influential features and obtain valuable insights for feature selection and model interpretability.…”
Section: Proposed Workmentioning
confidence: 99%
“…The research of Gebremariam, Panda, and Indu [ 6 ] emphasises the value of combining machine learning with hierarchically designed WSNs and promotes accurate intrusion detection. Collectively, these studies underline the increasing emphasis on leveraging advanced methodologies to strengthen WSN security against sophisticated threats [ 7 ]. More of the existing research works are discussed in Table 1 .…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, wireless communication technology has been used extensively in both the military and civilian sectors [1], however, due to the open and broadcast characteristics of wireless channel, the inherent security problem of information leakage in wireless communication is caused [2], the stability of the wireless network signal transmission is relatively low. At the same time, with the increasing development of attack methods, various security problems in wireless communication will become more and more prominent [3], wireless security is confronted with the complexity of the secret key distribution process [4], putting forward new and higher requirements for the security of current wireless communication.…”
Section: Introductionmentioning
confidence: 99%