2017 International Conference on Signal Processing and Communication (ICSPC) 2017
DOI: 10.1109/cspc.2017.8305855
|View full text |Cite
|
Sign up to set email alerts
|

Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
3

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(37 citation statements)
references
References 21 publications
0
27
0
3
Order By: Relevance
“…Random forest is a predictor that collects the information from each tree { 9 ( , 3 , 9 , ≥ 1)}, where + , Z … . 3 are the output of each random trees. These trees are combined to form the aggregated estimation to train the forest using: 9 d ( , 9 ) = g [ 9 ( , , 9 )] (7) where is the expectation with respect to the random parameter, conditionally, on and the data set 9 .…”
Section: ) Random Forestmentioning
confidence: 99%
See 1 more Smart Citation
“…Random forest is a predictor that collects the information from each tree { 9 ( , 3 , 9 , ≥ 1)}, where + , Z … . 3 are the output of each random trees. These trees are combined to form the aggregated estimation to train the forest using: 9 d ( , 9 ) = g [ 9 ( , , 9 )] (7) where is the expectation with respect to the random parameter, conditionally, on and the data set 9 .…”
Section: ) Random Forestmentioning
confidence: 99%
“…In the classification situation where the dataset is divided into several classes based on the input parameters threshold values, the random forest classifier is obtained via a majority vote among the classification trees, that is v,9 ‡ ; + … . 3…”
Section: ) Random Forestmentioning
confidence: 99%
“…In order for a node to retransmit, it spends its energy over and over again for the very same packet, and this consumption eventually results in the reduction of energy. Normally, one byte is enough for making a CRC error in addition to disabling the data packet [16].…”
Section: Attacks On S-macmentioning
confidence: 99%
“…The first node tends to attain the medium, but the illicit nodes also get the benefit of this method and transmit the data packet with a low waiting time duration. It repeatedly transmits such packets to attain the medium and, hence, causes a hindrance for the legitimate nodes to have maximum access to the medium [16].…”
Section: B Unfairness Attackmentioning
confidence: 99%
“…The classification of attacks on wireless sensor networks in the direction of impact is given in [24,25,26].…”
Section: Honeywell Experionmentioning
confidence: 99%