[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chandnani et al., 2023 - Google Patents

A reliable protocol for data aggregation and optimized routing in IoT WSNs based on machine learning

Chandnani et al., 2023

Document ID
11590260059501147379
Author
Chandnani N
Khairnar C
Publication year
Publication venue
Wireless Personal Communications

External Links

Snippet

Abstract Data Aggregation for IoT-WSN, based on Machine Learning (ML), allows the Internet of Things (IoT) and Wireless Sensor Networks (WSN) to send accurate data to the trusted nodes. The existing work handles the dropouts well but is vulnerable to different …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Similar Documents

Publication Publication Date Title
Moulahi et al. Privacy‐preserving federated learning cyber‐threat detection for intelligent transport systems with blockchain‐based security
AlFarraj et al. Trust-based neighbor selection using activation function for secure routing in wireless sensor networks
Gebremariam et al. Blockchain‐Based Secure Localization against Malicious Nodes in IoT‐Based Wireless Sensor Networks Using Federated Learning
Qadri et al. The limitations in the state-of-the-art counter-measures against the security threats in H-IoT
Gyawali et al. Deep reinforcement learning based dynamic reputation policy in 5g based vehicular communication networks
Yin et al. Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks
VS et al. Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks
Chandnani et al. A reliable protocol for data aggregation and optimized routing in IoT WSNs based on machine learning
Ambareesh et al. HRDSS-WMSN: a multi-objective function for optimal routing protocol in wireless multimedia sensor networks using hybrid red deer salp swarm algorithm
Akbani et al. EMLTrust: an enhanced machine learning based reputation system for MANETs
Li et al. Effective data optimization and evaluation based on social communication with AI‐assisted in opportunistic social networks
Hameed et al. A context-aware information-based clone node attack detection scheme in Internet of Things
Revanesh et al. DAG block: Trust aware load balanced routing and lightweight authentication encryption in WSN
Kumar et al. Design and analysis of lightweight trust mechanism for accessing data in MANETs
Su et al. Trusted opportunistic routing based on node trust model
Yin et al. EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks
Xia et al. Applying trust enhancements to reactive routing protocols in mobile ad hoc networks
Tyagi et al. A detailed study on trust management techniques for security and privacy in IoT: Challenges, trends, and research directions
Samriya et al. Blockchain and Reinforcement Neural Network for Trusted Cloud-Enabled IoT Network
Hajian et al. Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring
Tripathi et al. ReTrust: Reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IOV)
Ramalingam et al. Fork-Hook encryption policy based secured Data Centric Routing Gateway for proactive trust ware data transmission in WBSN
Wang et al. FRNet: An MCS framework for efficient and secure data sensing and privacy protection in IoVs
Huang A Data‐Driven WSN Security Threat Analysis Model Based on Cognitive Computing
AM High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism