2020
DOI: 10.1007/s11227-019-03131-x
|View full text |Cite
|
Sign up to set email alerts
|

A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms

Abstract: Wireless Sensor Networks (WSN) contain numerous nodes that their main goals are to monitor and control environments. Also, sensor nodes distribute based on network usage. One of the most significant issues in this type of network is the energy consumption of sensor nodes. In fixed-sink networks, nodes which are near the sink act as an interface to transfer data of other nodes to sink. This causes the energy consumption of sensors reduces rapidly. Therefore, the lifetime of the network declines. Sensor nodes ow… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
43
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 57 publications
(44 citation statements)
references
References 27 publications
1
43
0
Order By: Relevance
“…Hypothesis 2: the results of this hypothesis is based on the results of the following researches [10,11]. Hypothesis 3: the results of this hypothesis is consistent with the results of the following research [8].…”
Section: Discussionsupporting
confidence: 72%
“…Hypothesis 2: the results of this hypothesis is based on the results of the following researches [10,11]. Hypothesis 3: the results of this hypothesis is consistent with the results of the following research [8].…”
Section: Discussionsupporting
confidence: 72%
“…This model can capture the UAVs' acceleration correlation in both spatial and temporal domains accommodating the analysis and design. Based on [27], a uniform distribution exists for the ST model's stationary node leading to some closed-form connectivity. The major acronyms and notations used in this paper are provided Table 3.…”
Section: Motion Direction Of the Uavmentioning
confidence: 99%
“…PDR results from dividing the total received packets of data at the destination UAV, to the total transmitted packets of data by the source UAV, denoted in percentage[25][26][27][28]. Eq.…”
mentioning
confidence: 99%
“…When the BS is in the network, EECRP can send a significant amount of data with very low energy loss. Therefore, network lifetime is longer for EECRP than it is for LEACH [9].…”
Section: Aomdv-iot Techniquementioning
confidence: 99%