Chandnani et al., 2023 - Google Patents
A reliable protocol for data aggregation and optimized routing in IoT WSNs based on machine learningChandnani et al., 2023
- Document ID
- 11590260059501147379
- Author
- Chandnani N
- Khairnar C
- Publication year
- Publication venue
- Wireless Personal Communications
External Links
Snippet
Abstract Data Aggregation for IoT-WSN, based on Machine Learning (ML), allows the Internet of Things (IoT) and Wireless Sensor Networks (WSN) to send accurate data to the trusted nodes. The existing work handles the dropouts well but is vulnerable to different …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Moulahi et al. | Privacy‐preserving federated learning cyber‐threat detection for intelligent transport systems with blockchain‐based security | |
AlFarraj et al. | Trust-based neighbor selection using activation function for secure routing in wireless sensor networks | |
Gebremariam et al. | Blockchain‐Based Secure Localization against Malicious Nodes in IoT‐Based Wireless Sensor Networks Using Federated Learning | |
Qadri et al. | The limitations in the state-of-the-art counter-measures against the security threats in H-IoT | |
Gyawali et al. | Deep reinforcement learning based dynamic reputation policy in 5g based vehicular communication networks | |
Yin et al. | Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks | |
VS et al. | Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks | |
Chandnani et al. | A reliable protocol for data aggregation and optimized routing in IoT WSNs based on machine learning | |
Ambareesh et al. | HRDSS-WMSN: a multi-objective function for optimal routing protocol in wireless multimedia sensor networks using hybrid red deer salp swarm algorithm | |
Akbani et al. | EMLTrust: an enhanced machine learning based reputation system for MANETs | |
Li et al. | Effective data optimization and evaluation based on social communication with AI‐assisted in opportunistic social networks | |
Hameed et al. | A context-aware information-based clone node attack detection scheme in Internet of Things | |
Revanesh et al. | DAG block: Trust aware load balanced routing and lightweight authentication encryption in WSN | |
Kumar et al. | Design and analysis of lightweight trust mechanism for accessing data in MANETs | |
Su et al. | Trusted opportunistic routing based on node trust model | |
Yin et al. | EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks | |
Xia et al. | Applying trust enhancements to reactive routing protocols in mobile ad hoc networks | |
Tyagi et al. | A detailed study on trust management techniques for security and privacy in IoT: Challenges, trends, and research directions | |
Samriya et al. | Blockchain and Reinforcement Neural Network for Trusted Cloud-Enabled IoT Network | |
Hajian et al. | Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring | |
Tripathi et al. | ReTrust: Reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IOV) | |
Ramalingam et al. | Fork-Hook encryption policy based secured Data Centric Routing Gateway for proactive trust ware data transmission in WBSN | |
Wang et al. | FRNet: An MCS framework for efficient and secure data sensing and privacy protection in IoVs | |
Huang | A Data‐Driven WSN Security Threat Analysis Model Based on Cognitive Computing | |
AM | High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism |