2023
DOI: 10.1155/2023/2744706
|View full text |Cite
|
Sign up to set email alerts
|

Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network

Abstract: Security enhancement in wireless sensor networks (WSNs) is significant in different applications. The advancement of routing attack localization is a crucial security research scenario. Various routing attacks degrade the network performance by injecting malicious nodes into wireless sensor networks. Sybil attacks are the most prominent ones generating false nodes similar to the station node. This paper proposed detection and localization against multiple attacks using security localization based on an optimiz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 68 publications
0
8
0
Order By: Relevance
“…The sensor nodes are assumed to be randomly deployed and are unaware of their location and position. At the same time, the beacon nodes and sink nodes are aware of their locations and positions, and they assist the unknown sensor nodes in locating the sensor nodes and identifying the malicious nodes by computing the distance between each node and its position, with each node having its own distinctive identifier [29]. The network model incorporates challenging design requirements and assumptions for efficient performance.…”
Section: Iot-based Network Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…The sensor nodes are assumed to be randomly deployed and are unaware of their location and position. At the same time, the beacon nodes and sink nodes are aware of their locations and positions, and they assist the unknown sensor nodes in locating the sensor nodes and identifying the malicious nodes by computing the distance between each node and its position, with each node having its own distinctive identifier [29]. The network model incorporates challenging design requirements and assumptions for efficient performance.…”
Section: Iot-based Network Modelmentioning
confidence: 99%
“…For one-bit data transmission, we get where E TX is the energy being sent, E f is the energy being received, and E e is the power being lost somewhere along the line [29]. Signal propagation, filtering, modulation, and channel coding all play a role in the amount of energy lost in the process.…”
Section: 1mentioning
confidence: 99%
See 3 more Smart Citations