2022
DOI: 10.1155/2022/8374473
|View full text |Cite
|
Sign up to set email alerts
|

Security-Aware Routing Protocol Based on Artificial Neural Network Algorithm and 6LoWPAN in the Internet of Things

Abstract: Today, with increasing information technology such as the Internet of Things (IoT) in human life, interconnection and routing protocols need to find optimal solution for safe data transformation with various smart devices. Therefore, it is necessary to provide an enhanced solution to address routing issues with respect to new interconnection methodologies such as the 6LoWPAN protocol. The artificial neural network (ANN) is based on the structure of intelligent systems as a branch of machine interference, has s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…By choosing the accuracy feature, the sensitivity and precision of the proposed method are 99.39%, 99.31%, and 99.28%, respectively. In the diagram of Figure (7), the time of intrusion detection and training required to identify attacks in seconds is shown in the proposed method with several meta-heuristic algorithms.…”
Section: Analyzementioning
confidence: 99%
See 1 more Smart Citation
“…By choosing the accuracy feature, the sensitivity and precision of the proposed method are 99.39%, 99.31%, and 99.28%, respectively. In the diagram of Figure (7), the time of intrusion detection and training required to identify attacks in seconds is shown in the proposed method with several meta-heuristic algorithms.…”
Section: Analyzementioning
confidence: 99%
“…The task of an intrusion detection system is to discover the abnormality and attack pattern in the network tra c and report the attacks to the rewall [6]. Most intrusion detection systems today are developed with machine learning methods such as arti cial neural networks [7], support vector machines [8], deep learning [9], etc. The advantage of using machine learning methods is that they have the ability to learn and recognize the pattern of attacks and provide good accuracy.…”
Section: Introductionmentioning
confidence: 99%
“…The information gain value is computed for all mobile nodes with the measured values from Eqs. (11) to (14). The node with higher residual energy and load contains a higher information gain.…”
Section: Gradient Boosted Multinomial Id3 Classification Algorithmmentioning
confidence: 99%
“…The features of MANET pre-empt enormous demands based on security design due to dynamic network topologies, absence of centralized control, and self-organizing character. Collaboration among MANET nodes remains a complex issue in transmitting packets among nodes [11].…”
Section: Introductionmentioning
confidence: 99%
“…Deep Learning and Reinforcement Learning [115] Cyber Attacks Detection Machine Learning [117] Security-Aware Deep Learning [118] Early Fire Detection Deep Learning…”
Section: Nb-iotmentioning
confidence: 99%