1,648
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks

, &
Article: 2246703 | Received 02 May 2023, Accepted 05 Aug 2023, Published online: 22 Aug 2023

References

  • Abdulganiyu, O. H., Ait Tchakoucht, T., & Saheed, Y. K. (2023). A systematic literature review for network intrusion detection system (IDS). International Journal of Information Security, https://doi.org/10.1007/s10207-023-00682-2
  • Abduvaliyev, A., Lee, S., & Lee, Y. K. (2010). Energy efficient hybrid intrusion detection system for wireless sensor networks. ICEIE 2010 - 2010 International Conference on Electronics and Information Engineering, Proceedings, 2(Iceie), 25–29. https://doi.org/10.1109/ICEIE.2010.5559708
  • Abualigah, L., Diabat, A., Mirjalili, S., Elaziz, M. A., & Gandomi, A. H. (2021). The arithmetic optimization algorithm. Computer Methods in Applied Mechanics and Engineering, 376, 113609. https://doi.org/10.1016/j.cma.2020.113609
  • Abualigah, L., Elaziz, M. A., Sumari, P., Geem, Z. W., & Gandomi, A. H. (2022). Reptile Search Algorithm (RSA): A nature-inspired meta-heuristic optimizer. Expert Systems with Applications, 191(November 2021), 116158. https://doi.org/10.1016/j.eswa.2021.116158
  • Abualigah, L., Yousri, D., Elaziz, M. A., Ewees, A. A., Al-qaness, M. A. A., & Gandomi, A. H. (2021). Aquila optimizer: A novel meta-heuristic optimization algorithm. Computers and Industrial Engineering, 157(October 2020), 107250. https://doi.org/10.1016/j.cie.2021.107250
  • Agushaka, J. O., Ezugwu, A. E., & Abualigah, L. (2022). Dwarf mongoose optimization algorithm. Computer Methods in Applied Mechanics and Engineering, 391, 114570. https://doi.org/10.1016/j.cma.2022.114570
  • Ahmad, B., Jian, W., Ali, Z. A., Tanvir, S., & Ali Khan, M. S. (2019). Hybrid anomaly detection by using clustering for wireless sensor network. Wireless Personal Communications, 106(4), 1841–1853. https://doi.org/10.1007/s11277-018-5721-6
  • Alghamdi, M. I. (2022). A hybrid model for intrusion detection in IoT applications. Wireless Communications and Mobile Computing, 2022. https://doi.org/10.1155/2022/4553502
  • Alsaedi, N., Hashim, F., Sali, A., & Rokhani, F. Z. (2017). Detecting Sybil attacks in clustered wireless sensor networks based on energy trust system (ETS). Computer Communications, 110, 75–82. https://doi.org/10.1016/j.comcom.2017.05.006
  • Anbarasan, M., Muthu, B. A., Sivaparthipan, C. B., Sundarasekar, R., Kadry, S., Krishnamoorthy, S., Samuel, D. J., & Antony Dasel, A. (2020). Detection of flood disaster system based on IoT, Big data and convolutional deep neural network. Computer Communications, 150(November 2019), 150–157. https://doi.org/10.1016/j.comcom.2019.11.022
  • Bansal, A., & Kaur, S. (2018). Extreme gradient boosting based tuning for classification in intrusion detection systems. Vol. 905. Springer Singapore.
  • Biswas, P., Charitha, R., Gavel, S., & Raghuvanshi, A. S. (2019). Fault detection using hybrid of KF-ELM for wireless sensor networks. Proceedings of the International Conference on Trends in Electronics and Informatics, ICOEI, 2019(Icoei), 746–750. https://doi.org/10.1109/ICOEI.2019.8862687
  • Blywis, B. (2009). A real-time and energy-efficient MAC protocol for wireless sensor networks. International Journal of Ultra Wideband Communications and Systems, 1(2), 128–142. https://doi.org/10.1504/IJUWBCS.2009.029002
  • Cao, B., Li, C., Song, Y., Qin, Y., & Chen, C. (2022). Applied Sciences Network Intrusion Detection Model Based on CNN and GRU.
  • Cepheli, Ö., Büyükçorak, S., & Karabulut Kurt, G. (2016). Hybrid intrusion detection system for DDoS attacks. Journal of Electrical and Computer Engineering, 2016. https://doi.org/10.1155/2016/1075648
  • Choi, W., Shah, P., & Das, S. K. (2004). A framework for energy-saving data gathering using Two-phase clustering in wireless sensor networks. Proceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 203–212. https://doi.org/10.1109/MOBIQ.2004.1331727
  • Constraints, D. (2016). Source anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates With. https://doi.org/10.3390/s16070957.
  • Das, S., & Namasudra, S. (2022). A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure. Computers and Electrical Engineering, 101(September 2021), 107991. https://doi.org/10.1016/j.compeleceng.2022.107991
  • Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11(11), 5581–5609. https://doi.org/10.1007/s12652-020-01919-x
  • Deepa, C., & Latha, B. (2019). HHSRP: A cluster based hybrid hierarchical secure routing protocol for wireless sensor networks. Cluster Computing, 22(s5), 10449–10465. https://doi.org/10.1007/s10586-017-1065-3
  • Devi, P. P., & Jaison, B. (2020). Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms. Computer Communications, 152(January), 316–322. https://doi.org/10.1016/j.comcom.2020.01.064
  • Elsaid, S. A., & Albatati, N. S. (2020). An optimized collaborative intrusion detection system for wireless sensor networks. Soft Computing, 24(16), 12553–12567. https://doi.org/10.1007/s00500-020-04695-0
  • Ezugwu, A. E., Agushaka, J. O., Abualigah, L., Mirjalili, S., & Gandomi, A. H. (2022). Prairie Dog optimization algorithm. Vol. 34. Springer.
  • Farooqi, A. H., Khan, F. A., Wang, J., & Lee, S. (2013). A novel intrusion detection framework for wireless sensor networks. Personal and Ubiquitous Computing, 17(5), 907–919. https://doi.org/10.1007/s00779-012-0529-y
  • Faysal, J. A., Mostafa, S. T., Tamanna, J. S., Mumenin, K. M., Arifin, M. M., Awal, M. A., Shome, A., & Mostafa, S. S. (2022). XGB-RF: A hybrid machine learning approach for IoT intrusion detection. Telecom, 3(1), 52–69. https://doi.org/10.3390/telecom3010003
  • Feurer, M., & Hutter, F. (2019). Hyperparameter optimization. Automated Machine Learning: Methods, Systems, Challenges, 3–33. https://doi.org/10.1007/978-3-030-05318-5_1
  • Gandhimathi, L., & Murugaboopathi, G. (2020). A novel hybrid intrusion detection using flow-based anomaly detection and cross-layer features in wireless sensor network. Automatic Control and Computer Sciences, 54(1), 62–69. https://doi.org/10.3103/S0146411620010046
  • Gao, P. (2014). Mechatronics and automatic control systems. Lecture Notes in Electrical Engineering, 237, 1063–1071. https://doi.org/10.1007/978-3-319-01273-5_120
  • Gebreyesus, G. (2021). Secure intrusion detection system for hierarchically distributed wireless sensor networks. 9–14.
  • Ghugar, U., Pradhan, J., Bhoi, S. K., & Sahoo, R. R. (2019). LB-IDS: Securing wireless sensor network using protocol layer trust-based intrusion detection system. Journal of Computer Networks and Communications, 2019. https://doi.org/10.1155/2019/2054298
  • Godala, S., & Vaddella, R. P. V. (2020). A study on intrusion detection system in wireless sensor networks. International Journal of Communication Networks and Information Security, 12(1), 127–141.
  • Gupta, S. K., Tripathi, M., & Grover, J. (2022). Hybrid optimization and deep learning based intrusion detection system. Computers and Electrical Engineering, 100(May), 107876. https://doi.org/10.1016/j.compeleceng.2022.107876
  • Han, L., Zhou, M., Jia, W., Dalil, Z., & Xu, X. (2019). Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Information Sciences, 476, 491–504. https://doi.org/10.1016/j.ins.2018.06.017
  • Intelligence, A., Science, S., Media, B., & Nature, S. (2019). A new hybrid approach for intrusion detection using machine learning. Applied Intelligence, 2735–2761.
  • Ismail, A., & Amin, R. (2019). Malicious cluster head detection mechanism in wireless sensor networks. Wireless Personal Communications, 108(4), 2117–2135. https://doi.org/10.1007/s11277-019-06512-w
  • Jatti, S. A. V., & Kishor Sontif, V. J. K. (2019). Intrusion detection systems. International Journal of Recent Technology and Engineering, 8(2 Special Issue 11), 3976–3983. https://doi.org/10.35940/ijrte.B1540.0982S1119
  • Jiang, S., Zhao, J., & Xu, X. (2020). SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access, 8, 169548–58. https://doi.org/10.1109/ACCESS.2020.3024219
  • Kanna, P. R., & Santhi, P. (2022). Hybrid intrusion detection using MapReduce based black widow optimized convolutional long short-term memory neural networks. Expert Systems with Applications, 194(October 2021), 116545. https://doi.org/10.1016/j.eswa.2022.116545
  • Kasongo, S. M. (2021). An advanced intrusion detection system for IIoT based on GA and tree based algorithms. IEEE Access, 9, 113199–113212. https://doi.org/10.1109/ACCESS.2021.3104113
  • Khilar, R., Mariyappan, K., Christo, M. S., Amutharaj, J., Anitha, T., Rajendran, T., & Batu, A. (2022). Artificial intelligence-based security protocols to resist attacks in Internet of things. Wireless Communications and Mobile Computing, 2022. https://doi.org/10.1155/2022/1440538
  • Kumar, S. M. (2022). Hybrid optimized deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural Processing Letters, https://doi.org/10.1007/s11063-022-10892-9
  • Lai, G. H. (2016). Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. Eurasip Journal on Wireless Communications and Networking, 2016(1), https://doi.org/10.1186/s13638-016-0776-0
  • Li, L., Yu, Y., Bai, S., Cheng, J., & Chen, X. (2018). Towards effective network intrusion detection: A Hybrid Model Integrating Gini Index and GBDT with PSO. 2018.
  • Liu, W., Cheng, J., Wang, X., Lu, X., & Yin, J. (2022). Hybrid differential privacy based federated learning for Internet of things. Journal of Systems Architecture, 124(July 2021), 102418. https://doi.org/10.1016/j.sysarc.2022.102418
  • Mahajan, S., Harikrishnan, R., & Kotecha, K. (2022). Prediction of network traffic in wireless Mesh networks using hybrid deep learning model. IEEE Access, 10, 7003–7015. https://doi.org/10.1109/ACCESS.2022.3140646
  • Mahbooba, B., Timilsina, M., Sahal, R., & Serrano, M. (2021). Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity, 2021. https://doi.org/10.1155/2021/6634811
  • Mangrulkar, R. S., & Negandhi, P. D. (2018). Applications of machine learning in wireless sensor networks. Soft Computing in Wireless Sensor Networks, 51–74. https://doi.org/10.1201/9780429438639-3
  • Meena, G., & Choudhary, R. R. (2017). A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. 2017 International Conference on Computer, Communications and Electronics, COMPTELIX, 2017, 553–558. https://doi.org/10.1109/COMPTELIX.2017.8004032
  • Mohd, N., Singh, A., & Bhadauria, H. S. (2020). A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks. Wireless Personal Communications, 111(3), 1999–2022. https://doi.org/10.1007/s11277-019-06969-9
  • Mojtaba, S., Bamakan, H., Wang, H., Yingjie, T., & Shi, Y. (2016). Neurocomputing An effective intrusion detection framework based on MCLP / SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing, 199, 90–102. https://doi.org/10.1016/j.neucom.2016.03.031
  • Moon, P. S., & Ingole, P. K. (2015). An overview on: Intrusion detection system with secure hybrid mechanism in wireless sensor network. Conference Proceeding - 2015 International Conference on Advances in Computer Engineering and Applications, ICACEA, 2015, 272–277. https://doi.org/10.1109/ICACEA.2015.7164714
  • Moulad, L., Belhadaoui, H., & Rifi, M. (2019). Implementation of an hierarchical hybrid intrusion detection mechanism in wireless sensor network based on energy management. Advances in Intelligent Systems and Computing, 756, 360–377. https://doi.org/10.1007/978-3-319-91337-7_33
  • Nancy, P., Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S. V. N., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888–895. https://doi.org/10.1049/iet-com.2019.0172
  • Ovelade, O. N., & Ezugwu, A. E. (2021). Ebola optimization search algorithm: A New nature-inspired metaheuristic algorithm for global optimization problems. International Conference on Electrical, Computer, and Energy Technologies, ICECET, 2021(December), 9–10. https://doi.org/10.1109/ICECET52533.2021.9698813
  • Pajila, P. J. B., Julie, E. G., & Robinson, Y. H. (2021). FBDR-Fuzzy Based DDoS attack detection and recovery mechanism for wireless sensor networks. Springer US.
  • Paliwal, P., & Kumar, D. (2018). ABC Based Neural Network Approach for Churn Prediction in Telecommunication Sector. Vol. 84.
  • Pande, S., Khamparia, A., & Gupta, D. (2021). Feature selection and comparison of classification algorithms for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing (0123456789), https://doi.org/10.1007/s12652-021-03411-6
  • Panigrahi, R., Borah, S., Pramanik, M., Bhoi, A. K., Barsocchi, P., Nayak, S. R., & Alnumay, W. (2022). Intrusion detection in cyber–physical environment using hybrid naïve Bayes—decision table and multi-objective evolutionary feature selection. Computer Communications, 188(September 2021), 133–144. https://doi.org/10.1016/j.comcom.2022.03.009
  • Praveen Kumar, D., Amgoth, T., & Annavarapu, C. S. R. (2019). Machine learning algorithms for wireless sensor networks: A survey. Information Fusion, 49(April 2018), 1–25. https://doi.org/10.1016/j.inffus.2018.09.013
  • Pundir, S., Wazid, M., Singh, D. P., Das, A. K., Rodrigues, J. J. P. C., & Park, Y. (2020). Intrusion detection protocols in wireless sensor networks integrated to Internet of things deployment: Survey and future challenges. IEEE Access, 8, 3343–3363. https://doi.org/10.1109/ACCESS.2019.2962829
  • Qi, G., Zhou, J., Jia, W., Liu, M., Zhang, S., & Xu, M. (2021). Intrusion detection for network based on elite clone artificial Bee colony and back propagation neural network. Wireless Communications and Mobile Computing, 2021. https://doi.org/10.1155/2021/9956371
  • Rabbani, M., Wang, Y. L., Khoshkangini, R., Jelodar, H., Zhao, R., & Hu, P. (2020). A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications, 151(May 2019), 102507. https://doi.org/10.1016/j.jnca.2019.102507
  • Regan, R., & Leo Manickam, J. M. (2019). An optimized energy saving model for hybrid security protocol in WMN. National Academy Science Letters, 42(6), 489–501. https://doi.org/10.1007/s40009-019-0789-4
  • Ren, J., Guo, J., Qian, W., Yuan, H., Hao, X., & Jingjing, H. (2019). Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Security and Communication Networks, 2019. https://doi.org/10.1155/2019/7130868
  • Reshma, V. K., Khan, I. R., Niranjanamurthy, M., Aggarwal, P. K., Hemalatha, S., Almuzaini, K. K., & Amoatey, E. T. (2022). Hybrid block-based lightweight machine learning-based predictive models for quality preserving in the Internet of Things- (IoT-) based medical images with diagnostic applications. Computational Intelligence and Neuroscience, 2022. https://doi.org/10.1155/2022/8173372
  • Rose, T., Kifayat, K., Abbas, S., & Asim, M. (2020). A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of energy environment. Journal of Parallel and Distributed Computing, 145, 124–139. https://doi.org/10.1016/j.jpdc.2020.06.012
  • Rouissi, N., Gharsellaoui, H., & Bouamama, S. (2019). Improvement of watermarking-LEACH algorithm based on trust for wireless sensor networks. Procedia Computer Science, 159, 803–813. https://doi.org/10.1016/j.procs.2019.09.239
  • Roy, P., & Chowdhury, C. (2021). A survey of machine learning techniques for indoor localization and navigation systems. Journal of Intelligent and Robotic Systems: Theory and Applications, 101(3), https://doi.org/10.1007/s10846-021-01327-z
  • Sadikin, F., van Deursen, T., & Kumar, S. (2020). A ZigBee intrusion detection system for IoT using secure and efficient data collection. Internet of Things, 12, 100306. https://doi.org/10.1016/j.iot.2020.100306
  • Saheed, Y. K., Abdulganiyu, O. H., Tchakoucht, T. A., & Rakshit, S. (2022). A Novel Wrapper and Filter-Based Feature Dimensionality Reduction Methods for Anomaly Intrusion Detection in Wireless Sensor Networks. 1–22.
  • Saidi, A., Benahmed, K., & Seddiki, N. (2020). Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Networks, 106. https://doi.org/10.1016/j.adhoc.2020.102215
  • Saif, S., Das, P., Biswas, S., Khari, M., & Shanmuganathan, V. (2022). HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocessors and Microsystems, 104622. https://doi.org/10.1016/j.micpro.2022.104622
  • Sakthivel, T., & Chandrasekaran, R. M. (2018). A dummy packet-based hybrid security framework for mitigating routing misbehavior in multi-Hop wireless networks. Wireless Personal Communications, 101(3), 1581–1618. https://doi.org/10.1007/s11277-018-5778-2
  • Saravana Kumar, N. M., Suryaprabha, E., & Hariprasath, K. (2021). Machine learning based hybrid model for energy efficient secured transmission in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, https://doi.org/10.1007/s12652-021-02946-y
  • Shi, L., & Li, K. (2022). Privacy protection and intrusion detection system of wireless sensor network based on artificial neural network. Computational Intelligence and Neuroscience, 2022, 1795454. https://doi.org/10.1155/2022/1795454
  • Singh, A., Amutha, J., Nagar, J., & Sharma, S. (2023). A deep learning approach to predict the number of K-barriers for intrusion detection over a circular region using wireless sensor networks. Expert Systems with Applications, 211(July 2021), 118588. https://doi.org/10.1016/j.eswa.2022.118588
  • Singh, A., Amutha, J., Nagar, J., Sharma, S., & Lee, C. C. (2022a). AutoML-ID: Automated machine learning model for intrusion detection using wireless sensor network. Scientific Reports, 12(1), 1–14. https://doi.org/10.1038/s41598-021-99269-x
  • Singh, A., Amutha, J., Nagar, J., Sharma, S., & Lee, C. C. (2022b). LT-FS-ID: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors, 22(24), 3. https://doi.org/10.1109/JSEN.2022.3226962
  • Singh, A., Nagar, J., Sharma, S., & Kotiyal, V. (2021). A Gaussian process regression approach to predict the K-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Systems with Applications, 172(October 2020), 114603. https://doi.org/10.1016/j.eswa.2021.114603
  • Singh, R., Singh, J., & Singh, R. (2017). Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks. Wireless Communications and Mobile Computing, 2017. https://doi.org/10.1155/2017/3548607
  • Suleiman, M. F., & Issac, B. (2018). Performance comparison of intrusion detection machine learning classifiers on benchmark and new datasets. 28th International Conference on Computer Theory and Applications, ICCTA 2018 - Proceedings, 19–23. https://doi.org/10.1109/ICCTA45985.2018.9499140
  • Sun, P., Liu, P., Li, Q., Liu, C., Lu, X., Hao, R., & Chen, J. (2020). DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system. Security and Communication Networks, 2020. https://doi.org/10.1155/2020/8890306
  • Swarna Priya, R. M., Maddikunta, P. K. R., Parimala, M., Koppu, S., Gadekallu, T. R., Chowdhary, C. L., & Alazab, M. (2020). An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Computer Communications, 160(May), 139–149. https://doi.org/10.1016/j.comcom.2020.05.048
  • Ullah, S., Khan, M. A., Ahmad, J., Jamal, S. S., Huma, Z. E., Hassan, M. T., Nikolaos Pitropakis, A., & Buchanan, W. J. (2022). HDL-IDS: A hybrid deep learning architecture for intrusion detection in the Internet of vehicles. Sensors, 22(4), 1–20. https://doi.org/10.3390/s22041340
  • Umarani, C., & Kannan, S. (2020). Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network. Peer-to-Peer Networking and Applications, 13(3), 752–761. https://doi.org/10.1007/s12083-019-00781-9
  • Upadhyay, D., Manero, J., Zaman, M., & Sampalli, S. (2021). Learning classifiers for intrusion detection on power grids. Ieee Transactions on Network and Service Management, 18(1), 1104–1116. https://doi.org/10.1109/TNSM.2020.3032618
  • VenkataRao, S., & Ananth, V. (2021). A hybrid optimization algorithm and shamir secret sharing based secure data transmission for IoT based WSN. International Journal of Intelligent Engineering and Systems, 14(6), 498–506. https://doi.org/10.22266/ijies2021.1231.44
  • Vinitha, A., Rukmini, M. S. S., & Dhirajsunehra. (2019). Secure and energy aware multi-Hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. Journal of King Saud University - Computer and Information Sciences (xxxx). https://doi.org/10.1016/j.jksuci.2019.11.009.
  • Wang, Y., Ma, J., Sharma, A., Singh, P. K., Gaba, G. S., Masud, M., & Baz, M. (2021). An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks. Journal of Sensors, 2021. https://doi.org/10.1155/2021/5558860
  • Wu, Y., Wei, D., & Feng, J. (2020). Network attacks detection methods based on deep learning techniques: A survey. Security and Communication Networks, 2020. https://doi.org/10.1155/2020/8872923
  • Yang, L., Moubayed, A., & Shami, A. (2022). MTH-IDS: A multitiered hybrid intrusion detection system for Internet of vehicles. IEEE Internet of Things Journal, 9(1), 616–632. https://doi.org/10.1109/JIOT.2021.3084796
  • Yin, C., Zhang, S., Yin, Z., & Wang, J. (2019). Anomaly detection model based on data stream clustering. Cluster Computing, 22(s1), 1729–1738. https://doi.org/10.1007/s10586-017-1066-2
  • Yuan, Y., Huo, L., Wang, Z., & Hogrefe, D. (2018). Secure APIT localization scheme against Sybil attacks in distributed wireless sensor networks. IEEE Access, 6, 27629–27636. https://doi.org/10.1109/ACCESS.2018.2836898
  • Zhang, W., Han, D., Li, K. C., & Massetto, F. I. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24(16), 12361–12374. https://doi.org/10.1007/s00500-020-04678-1
  • Zhao, G., Wang, Y., & Wang, J. (2023). Lightweight intrusion detection model of the Internet of Things with Hybrid Cloud-Fog Computing. 2023.
  • Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727–1765. https://doi.org/10.1109/JPROC.2016.2558521