2019
DOI: 10.5573/ieiespc.2019.8.1.058
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Algorithm against Replica Node Attack in Mobile Wireless Sensor Networks using Learning Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…Jamshidi et al proposed a new algorithm in [41] to detect the cloned nodes in a mobile WSN in which watchdog nodes use the learning agent. e watchdog nodes monitor the movement of nodes as well as network traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Jamshidi et al proposed a new algorithm in [41] to detect the cloned nodes in a mobile WSN in which watchdog nodes use the learning agent. e watchdog nodes monitor the movement of nodes as well as network traffic.…”
Section: Related Workmentioning
confidence: 99%
“…The penalty area of QL is to absorb a policy, which expresses an agent pardons action to take under what surroundings that does not even necessitate a model of the environment and it can grip difficulties with stochastic transitions and plunders, deprived from necessitating adaptations [20], [120]. [23] IoT representation annotation [24] Data-driven management [25] Data and Feedback validation [26] Visualization and understanding [27] Learning environment detection [28] Fraud detection [29] Prediction of the performance [50] Classification of capability [51] Tolerance related acquisition [52] IoT crime forensics [53] Fraud detection in IoT application [54] IoT decision process and making [55] LA Intrusion prediction [30] IoT representation annotation [31] Data-driven management [32] Data and Feedback validation [33] Visualization and understanding [34] Learning environment detection [35] Fraud detection [36] Predicting Software Defects on IoTs [56] Prediction of behavioral changes [57] Signature verification [58] Analysis and decisions [59] Auto-selection of IoT task [60] Traffic incident detection [61] Telecommunication [62] Internet networks [63] MDP Intrusion prediction [37] IoT representation annotation [38] Data-driven management [39] Data and Feedback validation [40] Visualization and understanding [41] Learning environment detection [42] Fraud detection [43] Re...…”
Section: Q-learningmentioning
confidence: 99%
“…Learning largely involves adjustments to the synaptic connections that exist between the neurons with entities including Interconnections, learning rules [21]. ANN holds five basic categories of neuron connection that include a single-layer feed-forward network, a multilayer feed-forward network is a single node with its own feedback, a single-layer recurrent network, and lastly multilayer recurrent network [22]. In table 1, we present a summarized classification of the IoT aspects based on the IoT issues and application.…”
Section: A Reinforcement Learning Applicabilitymentioning
confidence: 99%
“…In [15], an intelligent, and lightweight algorithm based on learning agents and watchdog nodes is proposed to detect clone nodes in mobile WSNs. This algorithm employs some watchdog nodes, each one equipped with a learning agent that monitors the network traffic and nodes' movements to identify potential replica nodes in the network.…”
Section: A Related Workmentioning
confidence: 99%
“…Additionally, since sensor nodes are mobile, they should periodically (after each t time unit, or when they reach a new location in the network) broadcast a Hello message, a route request, send data or send a keep-alive message [2,3,10,[15][16][17]. This broadcasting is one of the requirements of a mobile WSN.…”
Section: B System Assumptions and Symbolsmentioning
confidence: 99%