2022
DOI: 10.1016/j.gltp.2022.03.018
|View full text |Cite
|
Sign up to set email alerts
|

An optimal cluster & trusted path for routing formation and classification of intrusion using the machine learning classification approach in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…Here, the DA and FAR metrics focus on attack detection whereas the routing can be analyzed by AEU and PLR metrics. The compared models are TALAD, 21 RBP‐DT, 20 and SVM 22 . The performance of these models is assessed by varying the number of nodes from 50 to 300.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, the DA and FAR metrics focus on attack detection whereas the routing can be analyzed by AEU and PLR metrics. The compared models are TALAD, 21 RBP‐DT, 20 and SVM 22 . The performance of these models is assessed by varying the number of nodes from 50 to 300.…”
Section: Resultsmentioning
confidence: 99%
“…The following section enumerates the numerous existing intrusion detection system and routing protocols for IWSN. In Reference 20, a new recursive binary partitioning decision tree (RBP‐DT) model has been presented to identify and classify the DoS attack in the IWSN environment. Initially, the cluster establishment is invoked by applying particle swarm optimization.…”
Section: Literature Surveymentioning
confidence: 99%
“…Srividya and Devi [13] the author introduced a strategy named ECPSO-PCM which concentrates on PSO optimization, clustering and trust management. The residual energy and spatial correlation-based clustering is used then trust based CH selection is introduced.…”
Section: Comprehensive Survey 21 Trust Oriented Wireless Sensor Networkmentioning
confidence: 99%
“…Step 7: Confined exploitation In this step, confined exploitation is enunciated with the subsequent Equation (33),…”
Section: Ideal Path Assortmentmentioning
confidence: 99%
“…35 The hierarchical protocols present routing creation by multi-hop; the n number has cluster for its own cluster head to the network. 33 Long-distance data transmission requires considerable energy consumption due to performance deterioration, whereas tiny-distance data transmission uses less power. The objectives for optimization clustering, power consumption, routing, lifespan, calibration, throughput, quality of services, connectivity, and coverage.…”
mentioning
confidence: 99%