2021
DOI: 10.1002/cpe.6557
|View full text |Cite
|
Sign up to set email alerts
|

An anomalous co‐operative trust & PG‐DRL based vampire attack detection & routing

Abstract: Sensor nodes in WSN play a vital role in communication, IoTs and many other emergencies too. However, the energy consumption of nodes is a major setback to these, which incites various malicious nodes/attacks. This article studies and presents the solution to Vampire attack-one of those kinds of attacks. It depletes the energy by route elongation of data transmission. This article has suggested a novel two-fold mechanism to detect the attack by integrating co-operation trust mechanism and the mitigation of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 25 publications
(28 reference statements)
0
2
0
Order By: Relevance
“…Table 2 lists the notation of equations in the article. The energy consumption incurred in the reception is calculated as Since a node consumes the energy in transmission as well as in reception, so the total energy consumption is the sum of Equations ( 24) and (25).…”
Section: Methodsmentioning
confidence: 99%
“…Table 2 lists the notation of equations in the article. The energy consumption incurred in the reception is calculated as Since a node consumes the energy in transmission as well as in reception, so the total energy consumption is the sum of Equations ( 24) and (25).…”
Section: Methodsmentioning
confidence: 99%
“…Behavioural modelling was also considered by Ma et al [161], which entailed a Long Short-Term Memory (LSTM) NN to build a baseline model trained on QoS trust properties to detect similarities between the real and modelled IoT devices. Juneja et al [162] focused on detecting energy related trust attacks aiming to deplete nodes' battery. Additionally, the proposed approach intends to aid secure routing in WSNs by avoiding malicious nodes.…”
Section: G Machine Learning Modelsmentioning
confidence: 99%