2023
DOI: 10.1016/j.aej.2023.09.064
|View full text |Cite
|
Sign up to set email alerts
|

Secure localization techniques in wireless sensor networks against routing attacks based on hybrid machine learning models

Gebrekiros Gebreyesus Gebremariam,
J. Panda,
S. Indu
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 52 publications
0
1
0
Order By: Relevance
“…Several existing approaches are considered for comparison, including EPK‐DNN, 16 IMOPSO, 17 AIDS‐HML, 19 PSO+KNN, 20 PSO+ANN, 20 FSACM, 21 LightGBM‐DAE, 22 HTF‐DS, 24 DHMLM, 25 SGM, 26 and HDL 27 using NADS datasets.…”
Section: Discussion On Simulation Outcomesmentioning
confidence: 99%
See 1 more Smart Citation
“…Several existing approaches are considered for comparison, including EPK‐DNN, 16 IMOPSO, 17 AIDS‐HML, 19 PSO+KNN, 20 PSO+ANN, 20 FSACM, 21 LightGBM‐DAE, 22 HTF‐DS, 24 DHMLM, 25 SGM, 26 and HDL 27 using NADS datasets.…”
Section: Discussion On Simulation Outcomesmentioning
confidence: 99%
“…However, the suggested approach did not analyze the computational overhead or resource consumption associated with implementing the system. Detection of various attacks and safe positioning in wireless sensor networks were suggested by Gebremariam GG et al 27 utilizing Hybrid DL (HDL) approaches and Sage for ideal distance, site, and data transfer. The purpose was to identify the finest distance among sensors and the finest location of sensors.…”
Section: Reviewmentioning
confidence: 99%
“…Gebremariam et al [23] delved into the dynamic field of researching the identification and localization of malicious nodes within WSNs, a pursuit that holds significant potential for extending the network's lifespan and enhancing its overall value. The utilization of anchor nodes, whose positions are known, facilitates informed estimations of unidentified nodes' placements.…”
Section: Methodsmentioning
confidence: 99%
“…This technique, based on Semi-Supervised Learning, provides robustness to various types of attacks through continuous learning of scenario characteristics. Similar logic was also used in [127] to detect routing-type threats, such as Wormhole and Sybil, using a hybrid ML approach optimized for distance, location, and data communication. The same attacks were also discussed in [128], where innovative detection algorithms based on the concept of the highest-rank common ancestor were introduced and validated.…”
Section: Authenticitymentioning
confidence: 99%