Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS

Share this page:

The Wireless Sensor Network (WSN) has evolved into a new IoT scheme, and its adoption has no restrictions at present. Sadly, security has an impact on the network of wireless sensors, and Denial-of-Service (DOS) categories of attacks are security concerns. This study therefore focuses on the distributed denial of service (DDOS), especially on DDoS-PSH-ACK (ACK & PUSH ACK Flood) in WSN. An experimental analysis was developed to predict that many spoofed ACK packets were reoccurring in order to deflate the target node. In the proposed approach, several experimental scenarios for the DDOS detection function were established and implemented. The experimental analysis draws traffic flow within the several transmission sessions involving “the normal transmission within sensor nodes and cluster head”, as well as the “transmission and retransmission scenarios within the sensor nodes and cluster head” at same time with different signal sizes. The main contribution of the paper is predicting DDoS attack by variability of transmission behavior with high degree accuracy. It was established that the most ideal delay between transmissions is 23 milliseconds in order to ensure that the receiving end is not overwhelmed. The result of the current study highlighted that when transmission session gets overwhelmed, that influence DDOS success.

View this article on IEEE Xplore

Reinforcement Learning Based MAC Protocol (UW-ALOHA-Q) for Underwater Acoustic Sensor Networks

The demand for regular monitoring of the marine environment and ocean exploration is rapidly increasing, yet the limited bandwidth and slow propagation speed of acoustic signals leads to low data throughput for underwater networks used for such purposes. This study describes a novel approach to medium access control that engenders efficient use of an acoustic channel. ALOHA-Q is a medium access protocol designed for terrestrial radio sensor networks and reinforcement learning is incorporated into the protocol to provide efficient channel access. In principle, it potentially offers opportunities for underwater network design, due to its adaptive capability and its responsiveness to environmental changes. However, preliminary work has shown that the achievable channel utilisation is much lower in underwater environments compared with the terrestrial environment. Three improvements are proposed in this paper to address key limitations and establish a new protocol (UW-ALOHA-Q). The new protocol includes asynchronous operation to eliminate the challenges associated with time synchronisation under water, offer an increase in channel utilisation through a reduction in the number of slots per frame, and achieve collision free scheduling by incorporating a new random back-off scheme. Simulations demonstrate that UW-ALOHA-Q provides considerable benefits in terms of achievable channel utilisation, particularly when used in large scale distributed networks.

A Novel Design Approach for 5G Massive MIMO and NB-IoT Green Networks Using a Hybrid Jaya-Differential Evolution Algorithm

Our main objective is to reduce power consumption by responding to the instantaneous bit rate demand by the user for 4th Generation (4G) and 5th Generation (5G) Massive MIMO network configurations. Moreover, we present and address the problem of designing green LTE networks with the Internet of Things (IoT) nodes. We consider the new NarrowBand-IoT (NB-IoT) wireless technology that will emerge in current and future access networks. In this context, we apply emerging evolutionary algorithms in the context of green network design. We investigate three different cases to show the performance of the new proposed algorithm, namely the 4G, 5G Massive MIMO, and the NB-IoT technologies. More specifically, we investigate the Teaching-Learning-Optimization (TLBO), the Jaya algorithm, the self-adaptive differential evolution jDE algorithm, and other hybrid algorithms. We introduce a new hybrid algorithm named Jaya-jDE that uses concepts from both Jaya and jDE algorithms in an effective way. The results show that 5G Massive MIMO networks require about 50% less power consumption than the 4G ones, and the NB-IoT in-band deployment requires about 10% less power than guard-band deployment. Moreover, Jaya-jDE emerges as the best algorithm based on the results.

Wireless Communications and Applications Above 100 GHz: Opportunities and Challenges for 6G and Beyond

Frequencies from 100 GHz to 3 THz are promising bands for the next generation of wireless communication systems because of the wide swaths of unused and unexplored spectrum. These frequencies also offer the potential for revolutionary applications that will be made possible by new thinking, and advances in devices, circuits, software, signal processing, and systems. This paper describes many of the technical challenges and opportunities for wireless communication and sensing applications above 100 GHz, and presents a number of promising discoveries, novel approaches, and recent results that will aid in the development and implementation of the sixth generation (6G) of wireless networks, and beyond. This paper shows recent regulatory and standard body rulings that are anticipating wireless products and services above 100 GHz and illustrates the viability of wireless cognition, hyper-accurate position location, sensing, and imaging. This paper also presents approaches and results that show how long distance mobile communications will be supported to above 800 GHz since the antenna gains are able to overcome air-induced attenuation, and present methods that reduce the computational complexity and simplify the signal processing used in adaptive antenna arrays, by exploiting the Special Theory of Relativity to create a cone of silence in over-sampled antenna arrays that improve performance for digital phased array antennas. Also, new results that give insights into power efficient beam steering algorithms, and new propagation and partition loss models above 100 GHz are given, and promising imaging, array processing, and position location results are presented. The implementation of spatial consistency at THz frequencies, an important component of channel modeling that considers minute changes and correlations over space, is also discussed. This paper offers the first in-depth look at the vast applications of THz wireless products and applications and provides approaches.

Most Cited Article of 2017: Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their protocol suffers from smart card loss attack where the user identity and password can be guessed using offline brute force techniques. Moreover, the protocol suffers from known session-specific temporary information attack, which leads to the disclosure of session keys in other sessions. Furthermore, the protocol is vulnerable to tracking attack and fails to fulfill user untraceability. To address these deficiencies, we present a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry. We conduct a formal verification of our proposed protocol using ProVerif in order to demonstrate that our scheme fulfills the required security properties. We also present a comprehensive heuristic security analysis to show that our protocol is secure against all the possible attacks and provides the desired security features. The results we obtained show that our new protocol is a secure and lightweight solution for authentication and key agreement for Internet-integrated WSNs.

At a Glance

  • Journal: IEEE Access
  • Format: Open Access
  • Frequency: Continuous
  • Submission to Publication: 4-6 weeks (typical)
  • Topics: All topics in IEEE
  • Average Acceptance Rate: 27%
  • Impact Factor: 3.4
  • Model: Binary Peer Review
  • Article Processing Charge: US $1,995

Featured Articles

ieee research paper on sensor network

Robotic Monitoring of Habitats: The Natural Intelligence Approach

View in IEEE Xplore

ieee research paper on sensor network

A Broad Ensemble Learning System for Drifting Stream Classification

ieee research paper on sensor network

Increasing Light Load Efficiency in Phase-Shifted, Variable Frequency Multiport Series Resonant Converters

Submission guidelines.

© 2024 IEEE - All rights reserved. Use of this website signifies your agreement to the IEEE TERMS AND CONDITIONS.

A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

AWARD RULES:

NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING.

These rules apply to the “2024 IEEE Access Best Video Award Part 2″ (the “Award”).

  • Sponsor: The Sponsor of the Award is The Institute of Electrical and Electronics Engineers, Incorporated (“IEEE”) on behalf of IEEE Access , 445 Hoes Lane, Piscataway, NJ 08854-4141 USA (“Sponsor”).
  • Eligibility: Award is open to residents of the United States of America and other countries, where permitted by local law, who are the age of eighteen (18) and older. Employees of Sponsor, its agents, affiliates and their immediate families are not eligible to enter Award. The Award is subject to all applicable state, local, federal and national laws and regulations. Entrants may be subject to rules imposed by their institution or employer relative to their participation in Awards and should check with their institution or employer for any relevant policies. Void in locations and countries where prohibited by law.
  • Agreement to Official Rules : By participating in this Award, entrants agree to abide by the terms and conditions thereof as established by Sponsor. Sponsor reserves the right to alter any of these Official Rules at any time and for any reason.  All decisions made by Sponsor concerning the Award including, but not limited to the cancellation of the Award, shall be final and at its sole discretion. 
  • How to Enter: This Award opens on July 1, 2024 at 12:00 AM ET and all entries must be received by 11:59 PM ET on December 31, 2024 (“Promotional Period”).

Entrant must submit a video with an article submission to IEEE Access . The video submission must clearly be relevant to the submitted manuscript.  Only videos that accompany an article that is accepted for publication in IEEE Access will qualify.  The video may be simulations, demonstrations, or interviews with other experts, for example.  Your video file should not exceed 100 MB.

Entrants can enter the Award during Promotional Period through the following method:

  • The IEEE Author Portal : Entrants can upload their video entries while submitting their article through the IEEE Author Portal submission site .
  • Review and Complete the Terms and Conditions: After submitting your manuscript and video through the IEEE Author Portal, entrants should then review and sign the Terms and Conditions .

Entrants who have already submitted a manuscript to IEEE Access without a video can still submit a video for inclusion in this Award so long as the video is submitted within 7 days of the article submission date.  The video can be submitted via email to the article administrator.  All videos must undergo peer review and be accepted along with the article submission.  Videos may not be submitted after an article has already been accepted for publication. 

The criteria for an article to be accepted for publication in IEEE Access are:

  • The article must be original writing that enhances the existing body of knowledge in the given subject area. Original review articles and surveys are acceptable even if new data/concepts are not presented.
  • Results reported must not have been submitted or published elsewhere (although expanded versions of conference publications are eligible for submission).
  • Experiments, statistics, and other analyses must be performed to a high technical standard and are described in sufficient detail.
  • Conclusions must be presented in an appropriate fashion and are supported by the data.
  • The article must be written in standard English with correct grammar.
  • Appropriate references to related prior published works must be included.
  • The article must fall within the scope of IEEE Access
  • Must be in compliance with the IEEE PSPB Operations Manual.
  • Completion of the required IEEE intellectual property documents for publication.
  • At the discretion of the IEEE Access Editor-in-Chief.
  • Disqualification: The following items will disqualify a video from being considered a valid submission:
  • The video is not original work.
  • A video that is not accompanied with an article submission.
  • The article and/or video is rejected during the peer review process.
  • The article and/or video topic does not fit into the scope of IEEE Access .
  • The article and/or do not follow the criteria for publication in IEEE Access .
  • Videos posted in a comment on IEEE Xplore .
  • Content ​is off-topic, offensive, obscene, indecent, abusive or threatening to others.
  • Infringes the copyright, trademark or other right of any third party.
  • Uploads viruses or other contaminating or destructive features.
  • Is in violation of any applicable laws or regulations.
  • Is not in English​.
  • Is not provided within the designated submission time.
  • Entrant does not agree and sign the Terms and Conditions document.

Entries must be original. Entries that copy other entries, or the intellectual property of anyone other than the Entrant, may be removed by Sponsor and the Entrant may be disqualified. Sponsor reserves the right to remove any entry and disqualify any Entrant if the entry is deemed, in Sponsor’s sole discretion, to be inappropriate.

  • Entrant’s Warranty and Authorization to Sponsor: By entering the Award, entrants warrant and represent that the Award Entry has been created and submitted by the Entrant. Entrant certifies that they have the ability to use any image, text, video, or other intellectual property they may upload and that Entrant has obtained all necessary permissions. IEEE shall not indemnify Entrant for any infringement, violation of publicity rights, or other civil or criminal violations. Entrant agrees to hold IEEE harmless for all actions related to the submission of an Entry. Entrants further represent and warrant, if they reside outside of the United States of America, that their participation in this Award and acceptance of a prize will not violate their local laws.
  • Intellectual Property Rights: Entrant grants Sponsor an irrevocable, worldwide, royalty free license to use, reproduce, distribute, and display the Entry for any lawful purpose in all media whether now known or hereinafter created. This may include, but is not limited to, the IEEE A ccess website, the IEEE Access YouTube channel, the IEEE Access IEEE TV channel, IEEE Access social media sites (LinkedIn, Facebook, Twitter, IEEE Access Collabratec Community), and the IEEE Access Xplore page. Facebook/Twitter/Microsite usernames will not be used in any promotional and advertising materials without the Entrants’ expressed approval.
  • Number of Prizes Available, Prizes, Approximate Retail Value and Odds of winning Prizes: Two (2) promotional prizes of $350 USD Amazon gift cards. One (1) grand prize of a $500 USD Amazon gift card. Prizes will be distributed to the winners after the selection of winners is announced. Odds of winning a prize depend on the number of eligible entries received during the Promotional Period. Only the corresponding author of the submitted manuscript will receive the prize.

The grand prize winner may, at Sponsor’ discretion, have his/her article and video highlighted in media such as the IEEE Access Xplore page and the IEEE Access social media sites.

The prize(s) for the Award are being sponsored by IEEE.  No cash in lieu of prize or substitution of prize permitted, except that Sponsor reserves the right to substitute a prize or prize component of equal or greater value in its sole discretion for any reason at time of award.  Sponsor shall not be responsible for service obligations or warranty (if any) in relation to the prize(s). Prize may not be transferred prior to award. All other expenses associated with use of the prize, including, but not limited to local, state, or federal taxes on the Prize, are the sole responsibility of the winner.  Winner(s) understand that delivery of a prize may be void where prohibited by law and agrees that Sponsor shall have no obligation to substitute an alternate prize when so prohibited. Amazon is not a sponsor or affiliated with this Award.

  • Selection of Winners: Promotional prize winners will be selected based on entries received during the Promotional Period. The sponsor will utilize an Editorial Panel to vote on the best video submissions. Editorial Panel members are not eligible to participate in the Award.  Entries will be ranked based on three (3) criteria:
  • Presentation of Technical Content
  • Quality of Video

Upon selecting a winner, the Sponsor will notify the winner via email. All potential winners will be notified via their email provided to the sponsor. Potential winners will have five (5) business days to respond after receiving initial prize notification or the prize may be forfeited and awarded to an alternate winner. Potential winners may be required to sign an affidavit of eligibility, a liability release, and a publicity release.  If requested, these documents must be completed, signed, and returned within ten (10) business days from the date of issuance or the prize will be forfeited and may be awarded to an alternate winner. If prize or prize notification is returned as undeliverable or in the event of noncompliance with these Official Rules, prize will be forfeited and may be awarded to an alternate winner.

  • General Prize Restrictions:  No prize substitutions or transfer of prize permitted, except by the Sponsor. Import/Export taxes, VAT and country taxes on prizes are the sole responsibility of winners. Acceptance of a prize constitutes permission for the Sponsor and its designees to use winner’s name and likeness for advertising, promotional and other purposes in any and all media now and hereafter known without additional compensation unless prohibited by law. Winner acknowledges that neither Sponsor, Award Entities nor their directors, employees, or agents, have made nor are in any manner responsible or liable for any warranty, representation, or guarantee, express or implied, in fact or in law, relative to any prize, including but not limited to its quality, mechanical condition or fitness for a particular purpose. Any and all warranties and/or guarantees on a prize (if any) are subject to the respective manufacturers’ terms therefor, and winners agree to look solely to such manufacturers for any such warranty and/or guarantee.

11.Release, Publicity, and Privacy : By receipt of the Prize and/or, if requested, by signing an affidavit of eligibility and liability/publicity release, the Prize Winner consents to the use of his or her name, likeness, business name and address by Sponsor for advertising and promotional purposes, including but not limited to on Sponsor’s social media pages, without any additional compensation, except where prohibited.  No entries will be returned.  All entries become the property of Sponsor.  The Prize Winner agrees to release and hold harmless Sponsor and its officers, directors, employees, affiliated companies, agents, successors and assigns from and against any claim or cause of action arising out of participation in the Award. 

Sponsor assumes no responsibility for computer system, hardware, software or program malfunctions or other errors, failures, delayed computer transactions or network connections that are human or technical in nature, or for damaged, lost, late, illegible or misdirected entries; technical, hardware, software, electronic or telephone failures of any kind; lost or unavailable network connections; fraudulent, incomplete, garbled or delayed computer transmissions whether caused by Sponsor, the users, or by any of the equipment or programming associated with or utilized in this Award; or by any technical or human error that may occur in the processing of submissions or downloading, that may limit, delay or prevent an entrant’s ability to participate in the Award.

Sponsor reserves the right, in its sole discretion, to cancel or suspend this Award and award a prize from entries received up to the time of termination or suspension should virus, bugs or other causes beyond Sponsor’s control, unauthorized human intervention, malfunction, computer problems, phone line or network hardware or software malfunction, which, in the sole opinion of Sponsor, corrupt, compromise or materially affect the administration, fairness, security or proper play of the Award or proper submission of entries.  Sponsor is not liable for any loss, injury or damage caused, whether directly or indirectly, in whole or in part, from downloading data or otherwise participating in this Award.

Representations and Warranties Regarding Entries: By submitting an Entry, you represent and warrant that your Entry does not and shall not comprise, contain, or describe, as determined in Sponsor’s sole discretion: (A) false statements or any misrepresentations of your affiliation with a person or entity; (B) personally identifying information about you or any other person; (C) statements or other content that is false, deceptive, misleading, scandalous, indecent, obscene, unlawful, defamatory, libelous, fraudulent, tortious, threatening, harassing, hateful, degrading, intimidating, or racially or ethnically offensive; (D) conduct that could be considered a criminal offense, could give rise to criminal or civil liability, or could violate any law; (E) any advertising, promotion or other solicitation, or any third party brand name or trademark; or (F) any virus, worm, Trojan horse, or other harmful code or component. By submitting an Entry, you represent and warrant that you own the full rights to the Entry and have obtained any and all necessary consents, permissions, approvals and licenses to submit the Entry and comply with all of these Official Rules, and that the submitted Entry is your sole original work, has not been previously published, released or distributed, and does not infringe any third-party rights or violate any laws or regulations.

12.Disputes:  EACH ENTRANT AGREES THAT: (1) ANY AND ALL DISPUTES, CLAIMS, AND CAUSES OF ACTION ARISING OUT OF OR IN CONNECTION WITH THIS AWARD, OR ANY PRIZES AWARDED, SHALL BE RESOLVED INDIVIDUALLY, WITHOUT RESORTING TO ANY FORM OF CLASS ACTION, PURSUANT TO ARBITRATION CONDUCTED UNDER THE COMMERCIAL ARBITRATION RULES OF THE AMERICAN ARBITRATION ASSOCIATION THEN IN EFFECT, (2) ANY AND ALL CLAIMS, JUDGMENTS AND AWARDS SHALL BE LIMITED TO ACTUAL OUT-OF-POCKET COSTS INCURRED, INCLUDING COSTS ASSOCIATED WITH ENTERING THIS AWARD, BUT IN NO EVENT ATTORNEYS’ FEES; AND (3) UNDER NO CIRCUMSTANCES WILL ANY ENTRANT BE PERMITTED TO OBTAIN AWARDS FOR, AND ENTRANT HEREBY WAIVES ALL RIGHTS TO CLAIM, PUNITIVE, INCIDENTAL, AND CONSEQUENTIAL DAMAGES, AND ANY OTHER DAMAGES, OTHER THAN FOR ACTUAL OUT-OF-POCKET EXPENSES, AND ANY AND ALL RIGHTS TO HAVE DAMAGES MULTIPLIED OR OTHERWISE INCREASED. ALL ISSUES AND QUESTIONS CONCERNING THE CONSTRUCTION, VALIDITY, INTERPRETATION AND ENFORCEABILITY OF THESE OFFICIAL RULES, OR THE RIGHTS AND OBLIGATIONS OF ENTRANT AND SPONSOR IN CONNECTION WITH THE AWARD, SHALL BE GOVERNED BY, AND CONSTRUED IN ACCORDANCE WITH, THE LAWS OF THE STATE OF NEW JERSEY, WITHOUT GIVING EFFECT TO ANY CHOICE OF LAW OR CONFLICT OF LAW, RULES OR PROVISIONS (WHETHER OF THE STATE OF NEW JERSEY OR ANY OTHER JURISDICTION) THAT WOULD CAUSE THE APPLICATION OF THE LAWS OF ANY JURISDICTION OTHER THAN THE STATE OF NEW JERSEY. SPONSOR IS NOT RESPONSIBLE FOR ANY TYPOGRAPHICAL OR OTHER ERROR IN THE PRINTING OF THE OFFER OR ADMINISTRATION OF THE AWARD OR IN THE ANNOUNCEMENT OF THE PRIZES.

  • Limitation of Liability:  The Sponsor, Award Entities and their respective parents, affiliates, divisions, licensees, subsidiaries, and advertising and promotion agencies, and each of the foregoing entities’ respective employees, officers, directors, shareholders and agents (the “Released Parties”) are not responsible for incorrect or inaccurate transfer of entry information, human error, technical malfunction, lost/delayed data transmissions, omission, interruption, deletion, defect, line failures of any telephone network, computer equipment, software or any combination thereof, inability to access web sites, damage to a user’s computer system (hardware and/or software) due to participation in this Award or any other problem or error that may occur. By entering, participants agree to release and hold harmless the Released Parties from and against any and all claims, actions and/or liability for injuries, loss or damage of any kind arising from or in connection with participation in and/or liability for injuries, loss or damage of any kind, to person or property, arising from or in connection with participation in and/or entry into this Award, participation is any Award-related activity or use of any prize won. Entry materials that have been tampered with or altered are void. If for any reason this Award is not capable of running as planned, or if this Award or any website associated therewith (or any portion thereof) becomes corrupted or does not allow the proper playing of this Award and processing of entries per these rules, or if infection by computer virus, bugs, tampering, unauthorized intervention, affect the administration, security, fairness, integrity, or proper conduct of this Award, Sponsor reserves the right, at its sole discretion, to disqualify any individual implicated in such action, and/or to cancel, terminate, modify or suspend this Award or any portion thereof, or to amend these rules without notice. In the event of a dispute as to who submitted an online entry, the entry will be deemed submitted by the authorized account holder the email address submitted at the time of entry. “Authorized Account Holder” is defined as the person assigned to an email address by an Internet access provider, online service provider or other organization responsible for assigning email addresses for the domain associated with the email address in question. Any attempt by an entrant or any other individual to deliberately damage any web site or undermine the legitimate operation of the Award is a violation of criminal and civil laws and should such an attempt be made, the Sponsor reserves the right to seek damages and other remedies from any such person to the fullest extent permitted by law. This Award is governed by the laws of the State of New Jersey and all entrants hereby submit to the exclusive jurisdiction of federal or state courts located in the State of New Jersey for the resolution of all claims and disputes. Facebook, LinkedIn, Twitter, G+, YouTube, IEEE Xplore , and IEEE TV are not sponsors nor affiliated with this Award.
  • Award Results and Official Rules: To obtain the identity of the prize winner and/or a copy of these Official Rules, send a self-addressed stamped envelope to Kimberly Rybczynski, IEEE, 445 Hoes Lane, Piscataway, NJ 08854-4141 USA.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

sensors-logo

Article Menu

ieee research paper on sensor network

  • Subscribe SciFeed
  • Recommended Articles
  • PubMed/Medline
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Machine learning for wireless sensor networks security: an overview of challenges and issues.

ieee research paper on sensor network

1. Introduction

  • We explain in detail the security requirements covered by ML algorithms in WSN security in current applications
  • We present a systematic and comprehensive survey of current technologies in the literature related to improving the security of WSNs using machine learning techniques. The pros and cons of each technique are also highlighted.
  • We describe the limitations of using ML in current security solutions for WSNs, the challenges open to ML algorithms in providing them with security, and future re-search solutions.

2. Background on WSN

2.1. wsn overview.

  • Independent nodes without a central control
  • Stationary or mobile WSN nodes
  • The transmission range of WSN nodes is also limited
  • The WSN network topology is constantly changing
  • Multiple hop connections
  • Limited bandwidth

2.2. WSN Applications

2.3. security in wsn, attacks on wsns.

  • Eavesdropping

2.4. Why Is Machine Learning Needed in WSN Security?

3. machine learning techniques, 3.1. supervised learning, 3.1.1. k-nearest neighbor, 3.1.2. decision tree, 3.1.3. random forest, 3.1.4. supportive vector machine, 3.1.5. naïve bayes, 3.1.6. artificial neural network, 3.1.7. logistic regression, 3.1.8. least-mean-square, 3.1.9. bayesian, 3.2. unsupervised learning, 3.2.1. k-means, 3.2.2. fuzzy logic, 3.3. deep learning, 3.3.1. convolutional neural networks, 3.3.2. recurrent neural networks, 3.3.3. long-term short memory, 3.3.4. multi-layer perceptron, 3.3.5. backpropagation neural networks, 4. wsn security challenges, 4.1. challenges of wsn security, 4.1.1. absence of centralized control, 4.1.2. wsns topology changes, 4.1.3. scalable trust management, 4.1.4. limited resources, 4.2. challenges of using ml algorithms in wsn security.

  • Machine learning algorithms, which include learning from historical data, cannot make accurate real-time predictions. The amount of additional data determines the efficiency of the algorithm. When the amount of data is huge, the cost of energy required to process it is equally large. In other words, there is a trade-off between the power limitations of the WSN and the higher computing burden of the ML algorithm. ML algorithms must be implemented centrally to avoid this trade-off. Therefore, these algorithms pose a risk [ 27 ] for wireless sensor network environments.
  • Machine learning techniques cannot be applied to all WSN’s security requirements. Sometimes it is difficult to apply them to some security domains, such as authentication and integrity [ 107 ]. Providing such operations between WSN nodes requires a high CPU and power. This can be represented by authentication between the vehicle and the driver, for example, but it is difficult to represent between one WSN node and another [ 108 ]. On the other hand, some studies have used ML algorithms for authentication through physical channel exploits [ 109 ]. These ML techniques are discussed in Section 5.2 .
  • Most machine learning algorithms have a margin of error, even if this margin is small, it is there. Therefore, in secret data, its confidentiality should be close to perfect [ 110 ]. The authors worked in [ 111 ] by providing a Mathematical Encryption Standard (MES) to increase case-based risk monitoring of confidential healthcare data using ML technology. Decision-making regarding the risk control strategy in MES was enhanced based on a fuzzy inference system integrated with neural networks. Analysis of the results shows that the MES error rate is less than 0.05 and the accuracy rate is 97%, which indicates their desire to increase security risks. Despite the improvements made by the authors, there is still an error rate, even if it is close to zero.

5. Applications of ML to Secure WSN Networks

5.1. availability, 5.1.1. intrusion detection.

Refs.ML TechniqueProcessing CostAdvantageLimitations
[ ]Water Cycle + DTLow
[ ]Various ML algorithms-
[ ]Various ML algorithms-
[ ]BLRlow
[ ]Fuzzy logic association rulesmedium
[ ]Two levels of SVMMedium
[ ]DNNHigh
[ ]PSO and BNNHigh
[ ]PSO, GA, rotation forest, and baggingHigh
[ ]SVM + MLPHigh
[ ]LTSM + Gaussian BayesHigh
[ ]MLP + GAHigh
[ ]SDN + different ML algorithmsLow
[ ]KNN + AOA
[ ]SDN + naïve Bayes Low
[ ]SDN + TIER-1Low
[ ]SDN + CNNLow
[ ]SDN + CNNLow

5.1.2. Error Detection

5.1.3. congestion control, 5.2. authentication.

Refs.ML TechniqueProcessing CostAdvantageAccuracyLimitations
[ ]LTSMModerateImproved performance accuracy for long-term fault signals99.5%
[ ]Gradient algorithm + DNNLowImproved authentication rate through reducing training time91%
[ ]Channel information + MLLowImproved authentication rate by using ε-greedy strategy 99.8%
[ ]kernel least-mean-squareHighImproved authentication rate by using reducing N-dimensional vector to a single-dimensional vector space97.5%
[ ]Various ML algorithmsModerate Improved performance accuracy through tracing WSN node behavior 96%
[ ]Various ML algorithmsModerateImproved performance accuracy through WSN node history 97.5%

5.3. ML-Based WSN Diversified Security

6. discussion and open issues, 6.1. location of the ml training process, 6.2. lightweight ml algorithms, 6.3. privacy concerns, 6.4. trust domain, 7. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Wazirali, R.; Ahmad, R.; Al-Amayreh, A.; Al-Madi, M.; Khalifeh, A. Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview. Electronics 2021 , 10 , 1744. [ Google Scholar ] [ CrossRef ]
  • Bouaziz, M.; Rachedi, A. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. Comput. Commun. 2016 , 74 , 3–15. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Al-Kashoash, H.A.A.; Kharrufa, H.; Al-Nidawi, Y.; Kemp, A.H. Congestion control in wireless sensor and 6LoWPAN networks: Toward the Internet of Things. Wirel. Networks 2019 , 25 , 4493–4522. [ Google Scholar ] [ CrossRef ]
  • Moridi, M.A.; Kawamura, Y.; Sharifzadeh, M.; Chanda, E.K.; Wagner, M.; Okawa, H. Performance analysis of ZigBee network topologies for underground space monitoring and communication systems. Tunn. Undergr. Sp. Technol. 2018 , 71 , 201–209. [ Google Scholar ] [ CrossRef ]
  • Ertürk, M.A.; Aydın, M.A.; Büyükakkaşlar, M.T.; Evirgen, H. A Survey on LoRaWAN Architecture, Protocol and Technologies. Futur. Internet 2019 , 11 , 216. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Kumar, V.; Tiwari, S. Routing in IPv6 over low-power wireless personal area networks (6LoWPAN): A survey. J. Comput. Netw. Commun. 2012 , 2012 , 316839. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Darabkh, K.A.; El-Yabroudi, M.Z.; El-Mousa, A.H. BPA-CRP: A Balanced Power-Aware Clustering and Routing Protocol for Wireless Sensor Networks ; Elsevier: Amsterdam, The Netherlands, 2019; Volume 82, ISBN 9626530081. [ Google Scholar ] [ CrossRef ]
  • Sah, D.K.; Amgoth, T. Parametric survey on cross-layer designs for wireless sensor networks. Comput. Sci. Rev. 2018 , 27 , 112–134. [ Google Scholar ] [ CrossRef ]
  • Khashan, O.A.; Ahmad, R.; Khafajah, N.M. An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad. Hoc. Netw. 2021 , 115 , 102448. [ Google Scholar ] [ CrossRef ]
  • Ahmad, R.; Sundararajan, E.A.; Abu-Ain, T. Analysis the Effect of Clustering and Lightweight Encryption Approaches on WSNs Lifetime. In Proceedings of the 2021 International Conference on Electrical Engineering and Informatics (ICEEI), Kuala Terengganu, Malaysia, 12–13 October 2021; IEEE: Selangor, Malaysia, 2021; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Yousefpoor, M.S.; Barati, H. Dynamic key management algorithms in wireless sensor networks: A survey. Comput. Commun. 2019 , 134 , 52–69. [ Google Scholar ] [ CrossRef ]
  • Rana, M.; Mamun, Q.; Islam, R. Lightweight cryptography in IoT networks: A survey. Futur. Gener. Comput. Syst. 2022 , 129 , 77–89. [ Google Scholar ] [ CrossRef ]
  • Sharma, H.; Haque, A.; Blaabjerg, F. Machine learning in wireless sensor networks for smart cities: A survey. Electronics 2021 , 10 , 1012. [ Google Scholar ] [ CrossRef ]
  • Schwendemann, S.; Amjad, Z.; Sikora, A. A survey of machine-learning techniques for condition monitoring and predictive maintenance of bearings in grinding machines. Comput. Ind. 2021 , 125 , 103380. [ Google Scholar ] [ CrossRef ]
  • Liu, H.; Lang, B. Machine learning and deep learning methods for intrusion detection systems: A survey. Appl. Sci. 2019 , 9 , 4396. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Cui, L.; Yang, S.; Chen, F.; Ming, Z.; Lu, N.; Qin, J. A survey on application of machine learning for Internet of Things. Int. J. Mach. Learn. Cybern. 2018 , 9 , 1399–1417. [ Google Scholar ] [ CrossRef ]
  • Rezaee, A.A.; Pasandideh, F. A Fuzzy Congestion Control Protocol Based on Active Queue Management in Wireless Sensor Networks with Medical Applications. Wirel. Pers. Commun. 2018 , 98 , 815–842. [ Google Scholar ] [ CrossRef ]
  • Masdari, M. Energy Efficient Clustering and Congestion Control in WSNs with Mobile Sinks ; Springer: Berlin/Heidelberg, Germany, 2020; Volume 111, ISBN 0123456789. [ Google Scholar ] [ CrossRef ]
  • Sangeetha, G.; Vijayalakshmi, M.; Ganapathy, S.; Kannan, A. A heuristic path search for congestion control in WSN. Lect. Notes Netw. Syst. 2018 , 11 , 485–495. [ Google Scholar ] [ CrossRef ]
  • Chen, S.; Wen, H.; Wu, J.; Chen, J.; Liu, W.; Hu, L.; Chen, Y. Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm. Wirel. Commun. Mob. Comput. 2018 , 2018 , 6039878. [ Google Scholar ] [ CrossRef ]
  • Liao, R.F.; Wen, H.; Wu, J.; Pan, F.; Xu, A.; Jiang, Y.; Xie, F.; Cao, M. Deep-learning-based physical layer authentication for industrial wireless sensor networks. Sensors 2019 , 19 , 2440. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Pan, F.; Wen, H.; Liao, R.; Jiang, Y.; Xu, A.; Ouyang, K.; Zhu, X. Physical layer authentication based on channel information and machine learning. In Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 9–11 October 2017; Volume 40, pp. 364–365. [ Google Scholar ] [ CrossRef ]
  • Javaid, A.; Javaid, N.; Wadud, Z.; Saba, T.; Sheta, O.E.; Saleem, M.Q.; Alzahrani, M.E. Machine learning algorithms and fault detection for improved belief function based decision fusion in wireless sensor networks. Sensors 2019 , 19 , 1334. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Zhang, H.; Liu, J.; Kato, N. Threshold Tuning-Based Wearable Sensor Fault Detection for Reliable Medical Monitoring Using Bayesian Network Model. IEEE Syst. J. 2018 , 12 , 1886–1896. [ Google Scholar ] [ CrossRef ]
  • Titouna, C.; Aliouat, M.; Gueroui, M. FDS: Fault Detection Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 2016 , 86 , 549–562. [ Google Scholar ] [ CrossRef ]
  • Rathore, H.; Badarla, V.; Jha, S.; Gupta, A. Novel approach for security in Wireless Sensor Network using bio-inspirations. In Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 6–10 January 2014. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Praveen Kumar, D.; Amgoth, T.; Annavarapu, C.S.R. Machine learning algorithms for wireless sensor networks: A survey. Inf. Fusion 2019 , 49 , 1–25. [ Google Scholar ] [ CrossRef ]
  • Islam, M.N.U.; Fahmin, A.; Hossain, M.S.; Atiquzzaman, M. Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques ; Springer: Berlin/Heidelberg, Germany, 2021; Volume 116, ISBN 0123456789. [ Google Scholar ] [ CrossRef ]
  • Bohloulzadeh, A.; Rajaei, M. A Survey on Congestion Control Protocols in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 2020 , 27 , 365–384. [ Google Scholar ] [ CrossRef ]
  • Vinayakumar, R.; Alazab, M.; Soman, K.P.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access 2019 , 7 , 41525–41550. [ Google Scholar ] [ CrossRef ]
  • Patel, S.T.; Mistry, N.H. A review: Sybil attack detection techniques in WSN. In Proceedings of the 2017 4th International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, 24–25 February 2017; Volume 17, pp. 184–188. [ Google Scholar ] [ CrossRef ]
  • Yu, J.Y.; Lee, E.; Oh, S.R.; Seo, Y.D.; Kim, Y.G. A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. IEEE Access 2020 , 8 , 45304–45324. [ Google Scholar ] [ CrossRef ]
  • Al-Emran, M.; Malik, S.I.; Al-Kabi, M.N. A Survey of Internet of Things (IoT) in Education: Opportunities and Challenges. In Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications ; Springer: Cham, Switzerland, 2020; pp. 197–209. ISBN 9783030245139. [ Google Scholar ] [ CrossRef ]
  • Zhang, G.; Kou, L.; Zhang, L.; Liu, C.; Da, Q.; Sun, J. A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT. Secur. Commun. Netw. 2017 , 2017 , 3126010. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Yi, L.; Tong, X.; Wang, Z.; Zhang, M.; Zhu, H.; Liu, J. A novel block encryption algorithm based on chaotic S-Box for wireless sensor network. IEEE Access 2019 , 7 , 53079–53090. [ Google Scholar ] [ CrossRef ]
  • Patel, N.R.; Kumar, S. Wireless Sensor Networks’ Challenges and Future Prospects. In Proceedings of the 2018 International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 23–24 November 2018; pp. 60–65. [ Google Scholar ] [ CrossRef ]
  • Zhang, X.; Heys, H.M.; Li, C. Energy efficiency of encryption schemes applied to wireless sensor networks. Secur. Commun. Netw. 2012 , 5 , 789–808. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Luo, J.; Zhang, Z.; Liu, C.; Luo, H. Reliable and Cooperative Target Tracking Based on WSN and WiFi in Indoor Wireless Networks. IEEE Access 2018 , 6 , 24846–24855. [ Google Scholar ] [ CrossRef ]
  • Qiao, B.; Ma, K. An enhancement of the ZigBee wireless sensor network using bluetooth for industrial field measurement. In Proceedings of the 2015 IEEE MTT-S International Microwave Workshop Series on Advanced Materials and Processes for RF and THz Applications (IMWS-AMP), Suzhou, China, 1–3 July 2015; pp. 2–4. [ Google Scholar ] [ CrossRef ]
  • Ghosh, R.K. Wireless Networking and Mobile Data Management ; Springer: Singapore, 2017; ISBN 978-981-10-3940-9. [ Google Scholar ] [ CrossRef ]
  • Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet Things J. 2017 , 4 , 1250–1258. [ Google Scholar ] [ CrossRef ]
  • Sicari, S.; Rizzardi, A.; Grieco, L.A.; Coen-Porisini, A. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 2015 , 76 , 146–164. [ Google Scholar ] [ CrossRef ]
  • Akhtar, F.; Rehmani, M.H. Energy replenishment using renewable and traditional energy resources for sustainable wireless sensor networks: A review. Renew. Sustain. Energy Rev. 2015 , 45 , 769–784. [ Google Scholar ] [ CrossRef ]
  • Lee, C.C. Security and privacy in wireless sensor networks: Advances and challenges. Sensors 2020 , 20 , 744. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Winkler, M.; Street, M.; Tuchs, K.-D.; Wrona, K. Wireless Sensor Networks for Military Purposes. In Autonomous Sensor Networks ; Springer: Berlin/Heidelberg, Germany, 2012; pp. 365–394. [ Google Scholar ] [ CrossRef ]
  • Pan, J.; Xu, Z.; Li, S. Security mechanism for a wireless-sensor-network-based healthcare monitoring system. IET Commun. 2012 , 6 , 3274–3280. [ Google Scholar ] [ CrossRef ]
  • Calvanese Strinati, E.; Barbarossa, S.; Gonzalez-Jimenez, J.L.; Ktenas, D.; Cassiau, N.; Maret, L.; Dehos, C. 6G: The Next Frontier: From Holographic Messaging to Artificial Intelligence Using Subterahertz and Visible Light Communication. IEEE Veh. Technol. Mag. 2019 , 14 , 42–50. [ Google Scholar ] [ CrossRef ]
  • Wang, H.; Wang, J.; Huang, M. Building a smart home system with WSN and service robot. In Proceedings of the 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation, Hong Kong, China, 16–17 January 2013; pp. 353–356. [ Google Scholar ] [ CrossRef ]
  • Kasah, N.B.H.; Aman, A.H.B.M.; Attarbashi, Z.S.M.; Fazea, Y. Investigation on 6LoWPAN data security for internet of things. In Proceedings of the 2020 2nd International Conference on Computer and Information Sciences, ICCIS 2020, Aljouf, KSA, Saudi Arabia, 7–9 April 2020; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2020. [ Google Scholar ] [ CrossRef ]
  • Seliem, M.; Elgazzar, K. IoTeWay: A Secure Framework Architecture for 6LoWPAN Based IoT Applications. In Proceedings of the 2018 IEEE Global Conference on Internet of Things (GCIoT 2018), Alexandria, Egypt, 5–7 December 2018; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Messaoud, S.; Bradai, A.; Bukhari, S.H.R.; Quang, P.T.A.; Ben Ahmed, O.; Atri, M. A survey on machine learning in Internet of Things: Algorithms, strategies, and applications. Internet Things 2020 , 12 , 100314. [ Google Scholar ] [ CrossRef ]
  • Mo, J.; Chen, H. A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks. Secur. Commun. Netw. 2019 , 2019 , 2136506. [ Google Scholar ] [ CrossRef ]
  • Nelli, A.; Mangasuli, S. Wireless Sensor Networks: An Overview on Security Issues and Challenges. Int. J. Adv. Eng. Manag. Sci. 2017 , 3 , 209–214. [ Google Scholar ] [ CrossRef ]
  • Finogeev, A.G.; Finogeev, A.A. Information attacks and security in wireless sensor networks of industrial SCADA systems. ACM Int. Conf. Proc. Ser. 2020 , 5 , 6–16. [ Google Scholar ] [ CrossRef ]
  • Yang, B.; Liu, F.; Yuan, L.; Zhang, Y. 6LoWPAN Protocol Based Infrared Sensor Network Human Target Locating System. In Proceedings of the Proceedings of the 15th IEEE Conference on Industrial Electronics and Applications, ICIEA 2020, Kristiansand, Norway, 9–13 November 2020; pp. 1773–1779. [ Google Scholar ] [ CrossRef ]
  • Wang, M.; Lu, Y.; Qin, J. A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput. Secur. 2020 , 88 , 101645. [ Google Scholar ] [ CrossRef ]
  • Kumar, P.M.; Gandhi, U.D. Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application. J. Supercomput. 2020 , 76 , 3963–3983. [ Google Scholar ] [ CrossRef ]
  • Olsson, J. 6LoWPAN Demystified ; Texas Instruments: Dallas, TX, USA, 2014; Volume 13, pp. 1–13. [ Google Scholar ]
  • Yang, Y.; Zheng, X.; Guo, W.; Liu, X.; Chang, V. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf. Sci. 2019 , 479 , 567–592. [ Google Scholar ] [ CrossRef ]
  • Ahmad, R.H.; Pathan, A.-S.K. A Study on M2M (Machine to Machine) System and Communication. In Security Solutions and Applied Cryptography in Smart Grid Communications ; IGI Global: Hershey, PA, USA, 2016; pp. 179–214. ISBN 9781522518310. [ Google Scholar ] [ CrossRef ]
  • Glissa, G.; Meddeb, A. 6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features. In Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; pp. 264–269. [ Google Scholar ] [ CrossRef ]
  • Mamdouh, M.; Elrukhsi, M.A.I.; Khattab, A. Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey. In Proceedings of the 2018 International Conference on Computer and Applications (ICCA), Beirut, Lebanon, 25–26 August 2018; pp. 215–218. [ Google Scholar ] [ CrossRef ]
  • Karakaya, A.; Akleylek, S. A survey on security threats and authentication approaches in wireless sensor networks. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; pp. 1–4. [ Google Scholar ] [ CrossRef ]
  • Zou, Y.; Wang, G. Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack. Proc. IEEE Trans. Ind. Inform. 2016 , 12 , 780–787. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Hamza, T.; Kaddoum, G.; Meddeb, A.; Matar, G. A survey on intelligent MAC layer jamming attacks and countermeasures in wsns. In Proceedings of the 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 18–21 September 2016; pp. 42–56. [ Google Scholar ] [ CrossRef ]
  • Reindl, P.; Nygard, K.; Du, X. Defending malicious collision attacks in wireless sensor networks. In Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China, 11–13 December 2010; pp. 771–776. [ Google Scholar ] [ CrossRef ]
  • Tayebi, A.; Berber, S.M.; Swain, A. Wireless sensor network attacks: An overview and critical analysis with detailed investigation on jamming attack effects. Smart Sens. Meas. Instrum. 2015 , 11 , 201–221. [ Google Scholar ] [ CrossRef ]
  • Ward, J.R.; Younis, M. A cross-layer defense scheme for countering traffic analysis attacks in Wireless Sensor Networks. In Proceedings of the MILCOM—2016 IEEE Military Communications Conference, Baltimore, MD, USA, 1–3 November 2016; pp. 972–977. [ Google Scholar ] [ CrossRef ]
  • Karuppiah, A.B.; Dalfiah, J.; Yuvashri, K.; Rajaram, S. An improvised hierarchical black hole detection algorithm in Wireless Sensor Networks. In Proceedings of the International Confernce on Innovation Information in Computing Technologies, Chennai, India, 19–20 February 2015; pp. 1–7. [ Google Scholar ] [ CrossRef ]
  • Alajmi, N.M.; Elleithy, K.M. Selective forwarding detection (SFD) in wireless sensor networks. In Proceedings of the 2015 Long Island Systems, Applications and Technology, Farmingdale, NY, USA, 1 May 2015. [ Google Scholar ] [ CrossRef ]
  • Modares, H.; Salleh, R.; Moravejosharieh, A. Overview of security issues in wireless sensor networks. In Proceedings of the 2011 Third International Conference on Computational Intelligence, Modelling & Simulation, Langkawi, Malaysia, 20–22 September 2011; pp. 308–311. [ Google Scholar ] [ CrossRef ]
  • Kumar, A.; Lim, T.J. EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 289–294. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities. IEEE Internet Things J. 2019 , 6 , 7702–7712. [ Google Scholar ] [ CrossRef ]
  • O’Mahony, G.D.; Harris, P.J.; Murphy, C.C. Investigating Supervised Machine Learning Techniques for Channel Identification in Wireless Sensor Networks. In Proceedings of the 2020 31st Irish Signals and Systems Conference (ISSC), Letterkenny, Ireland, 11–12 June 2020. [ Google Scholar ] [ CrossRef ]
  • Borkar, G.M.; Patil, L.H.; Dalgade, D.; Hutke, A. A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept. Sustain. Comput. Inform. Syst. 2019 , 23 , 120–135. [ Google Scholar ] [ CrossRef ]
  • Premkumar, M.; Sundararajan, T.V.P. DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks. Microprocess. Microsyst. 2020 , 79 , 103278. [ Google Scholar ] [ CrossRef ]
  • Singh, K.J.; De, T. MLP-GA based algorithm to detect application layer DDoS attack. J. Inf. Secur. Appl. 2017 , 36 , 145–153. [ Google Scholar ] [ CrossRef ]
  • Lu, X.; Han, D.; Duan, L.; Tian, Q. Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network. Int. J. Comput. Sci. Eng. 2020 , 22 , 221–232. [ Google Scholar ] [ CrossRef ]
  • Abuhamad, M.; Abuhmed, T.; Mohaisen, D.; Nyang, D. AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J. 2020 , 7 , 5008–5020. [ Google Scholar ] [ CrossRef ]
  • Modak, S.; Sehgal, D.; Valadi, J. Applications of artificial intelligence and machine learning in viral biology. Glob. Virol. III Virol. 21st Century 2019 , 154 , 1–39. [ Google Scholar ] [ CrossRef ]
  • Vashisht, G. ML Algorithms for Smart Sensor Networks. In Smart Sensor Networks ; Springer: Cham, Switzerland, 2022; pp. 73–103. ISBN 9783030772130. [ Google Scholar ] [ CrossRef ]
  • Ali, M.; Jung, L.T.; Abdel-Aty, A.H.; Abubakar, M.Y.; Elhoseny, M.; Ali, I. Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm. Expert Syst. Appl. 2020 , 151 , 113374. [ Google Scholar ] [ CrossRef ]
  • Sarker, I.H.; Colman, A.; Han, J.; Khan, A.I.; Abushark, Y.B.; Salah, K. BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model. Mob. Netw. Appl. 2020 , 25 , 1151–1161. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Bikmukhamedov, R.F.; Nadeev, A.F. Lightweight machine learning classifiers of IoT traffic flows. In Proceedings of the 2019 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), Yaroslavl, Russia, 1–3 July 2019. [ Google Scholar ] [ CrossRef ]
  • Sekulić, A.; Kilibarda, M.; Heuvelink, G.B.M.; Nikolić, M.; Bajat, B. Random Forest Spatial Interpolation. Remote Sens. 2020 , 12 , 1687. [ Google Scholar ] [ CrossRef ]
  • Pisner, D.A.; Schnyer, D.M. Support vector machine. In Machine Learning ; Elsevier: Amsterdam, The Netherlands, 2020; pp. 101–121. ISBN 9780128157398. [ Google Scholar ] [ CrossRef ]
  • Li, T.; Li, J.; Liu, Z.; Li, P.; Jia, C. Differentially private Naive Bayes learning over multiple data sources. Inf. Sci. 2018 , 444 , 89–104. [ Google Scholar ] [ CrossRef ]
  • Lee, C.H. An information-theoretic filter approach for value weighted classification learning in naive Bayes. Data Knowl. Eng. 2018 , 113 , 116–128. [ Google Scholar ] [ CrossRef ]
  • Yaghini, M.; Khoshraftar, M.M.; Fallahi, M. A hybrid algorithm for artificial neural network training. Eng. Appl. Artif. Intell. 2013 , 26 , 293–301. [ Google Scholar ] [ CrossRef ]
  • Peng, C.Y.J.; Lee, K.L.; Ingersoll, G.M. An introduction to logistic regression analysis and reporting. J. Educ. Res. 2002 , 96 , 3–14. [ Google Scholar ] [ CrossRef ]
  • Liu, W.; Pokharel, P.P.; Principe, J.C. The Kernel Least-Mean-Square Algorithm. IEEE Trans. Signal Process. 2008 , 56 , 543–554. [ Google Scholar ] [ CrossRef ]
  • Ghahramani, Z. Unsupervised Learning. In Summer School on Machine Learning ; Springer: Berlin/Heidelberg, Germany, 2004; pp. 72–112. [ Google Scholar ] [ CrossRef ]
  • Sinaga, K.P.; Yang, M. Unsupervised K-Means Clustering Algorithm. IEEE Access 2020 , 8 , 80716–80727. [ Google Scholar ] [ CrossRef ]
  • Kambalimath, S.; Deka, P.C. A basic review of fuzzy logic applications in hydrology and water resources. Appl. Water Sci. 2020 , 10 , 191. [ Google Scholar ] [ CrossRef ]
  • Marblestone, A.H.; Wayne, G.; Kording, K.P. Toward an integration of deep learning and neuroscience. Front. Comput. Neurosci. 2016 , 10 , 1–41. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Wazirali, R.; Ahmed, R. Hybrid Feature Extractions and CNN for Enhanced Periocular Identification During COVID-19. Comput. Syst. Sci. Eng. 2022 , 41 , 305–320. [ Google Scholar ] [ CrossRef ]
  • Albawi, S.; Mohammed, T.A.; Al-Zawi, S. Understanding of a convolutional neural network. In Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, 21–23 August 2017; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Kim, T.; Vecchietti, L.F.; Choi, K.; Lee, S.; Har, D. Machine Learning for Advanced Wireless Sensor Networks: A Review. IEEE Sens. J. 2021 , 21 , 12379–12397. [ Google Scholar ] [ CrossRef ]
  • Sherstinsky, A. Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network. Phys. D Nonlinear Phenom. 2020 , 404 , 132306. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Greff, K.; Srivastava, R.K.; Koutnik, J.; Steunebrink, B.R.; Schmidhuber, J. LSTM: A Search Space Odyssey. IEEE Trans. Neural Networks Learn. Syst. 2017 , 28 , 2222–2232. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Sun, X.; Xu, J.; Jiang, C.; Feng, J.; Chen, S.S.; He, F. Extreme learning machine for multi-label classification. Entropy 2016 , 18 , 225. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Xinghuo, Y.; Efe, M.O.; Kaynak, O. A general backpropagation algorithm for feedforward neural networks learning. IEEE Trans. Neural Netw. 2002 , 13 , 251–254. [ Google Scholar ] [ CrossRef ]
  • Zhang, D.G.; Zhu, Y.N.; Zhao, C.P.; Dai, W.B. A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IOT). Comput. Math. with Appl. 2012 , 64 , 1044–1055. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Meng, W.; Li, W.; Su, C.; Zhou, J.; Lu, R. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access 2017 , 6 , 7234–7243. [ Google Scholar ] [ CrossRef ]
  • Fang, W.; Zhang, W.; Chen, W.; Liu, Y.; Tang, C. TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wirel. Netw. 2020 , 26 , 3169–3182. [ Google Scholar ] [ CrossRef ]
  • Elhoseny, M.; Hassanien, A.E. Secure data transmission in WSN: An overview. Stud. Syst. Decis. Control 2019 , 165 , 115–143. [ Google Scholar ] [ CrossRef ]
  • Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine Learning in IoT Security: Current Solutions and Future Challenges. IEEE Commun. Surv. Tutorials 2020 , 22 , 1686–1721. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Talpur, A.; Gurusamy, M. Machine Learning for Security in Vehicular Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 2021 , 24 , 346–379. [ Google Scholar ] [ CrossRef ]
  • Xiao, L.; Li, Y.; Han, G.; Liu, G.; Zhuang, W. PHY-Layer Spoofing Detection with Reinforcement Learning in Wireless Networks. IEEE Trans. Veh. Technol. 2016 , 65 , 10037–10047. [ Google Scholar ] [ CrossRef ]
  • Pundir, M.; Sandhu, J.K. A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision. J. Netw. Comput. Appl. 2021 , 188 , 103084. [ Google Scholar ] [ CrossRef ]
  • Rizwan, M.; Shabbir, A.; Javed, A.R.; Srivastava, G.; Gadekallu, T.R.; Shabir, M.; Hassan, M.A. Risk monitoring strategy for confidentiality of healthcare information. Comput. Electr. Eng. 2022 , 100 , 107833. [ Google Scholar ] [ CrossRef ]
  • Roy, S.; Li, J.; Choi, B.J.; Bai, Y. A lightweight supervised intrusion detection mechanism for IoT networks. Futur. Gener. Comput. Syst. 2022 , 127 , 276–285. [ Google Scholar ] [ CrossRef ]
  • Ahmed Nacer, A.; Godart, C.; Rosinosky, G.; Tari, A.; Youcef, S. Business process outsourcing to the cloud: Balancing costs with security risks. Comput. Ind. 2019 , 104 , 59–74. [ Google Scholar ] [ CrossRef ]
  • Ahmad, R.; Wazirali, R.; Bsoul, Q.; Abu-Ain, T.; Abu-Ain, W. Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs’ Lifetime. Sensors 2021 , 21 , 4821. [ Google Scholar ] [ CrossRef ]
  • Wazirali, R.; Ahmad, R. Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime. Comput. Mater. Contin. 2022 , 70 , 4922–4946. [ Google Scholar ] [ CrossRef ]
  • Ioannou, C.; Vassiliou, V. An Intrusion Detection System for Constrained WSN and IoT Nodes Based on Binary Logistic Regression. In Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Montreal, QC, Canada, 28 October–2 November 2018; pp. 259–263. [ Google Scholar ] [ CrossRef ]
  • Ul Islam, R.; Hossain, M.S.; Andersson, K. A novel anomaly detection algorithm for sensor data under uncertainty. Soft Comput. 2018 , 22 , 1623–1639. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Tama, B.A.; Comuzzi, M.; Rhee, K.H. TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System. IEEE Access 2019 , 7 , 94497–94507. [ Google Scholar ] [ CrossRef ]
  • Gulganwa, P.; Jain, S. EES-WCA: Energy efficient and secure weighted clustering for WSN using machine learning approach. Int. J. Inf. Technol. 2022 , 14 , 135–144. [ Google Scholar ] [ CrossRef ]
  • Wu, D.; Jiang, Z.; Xie, X.; Wei, X.; Yu, W.; Li, R. LSTM Learning with Bayesian and Gaussian Processing for Anomaly Detection in Industrial IoT. IEEE Trans. Ind. Informat. 2020 , 16 , 5244–5253. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Wazirali, R.; Ahmad, R.; Alhiyari, S. SDN-OpenFlow Topology Discovery: An Overview of Performance Issues. Appl. Sci. 2021 , 11 , 6999. [ Google Scholar ] [ CrossRef ]
  • Amangele, P.; Reed, M.J.; Al-Naday, M.; Thomos, N.; Nowak, M. Hierarchical Machine Learning for IoT Anomaly Detection in SDN. In Proceedings of the 2019 International Conference on Information Technologies (InfoTech), Varna, Bulgari, 19–20 September 2019; pp. 19–20. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Liu, G.; Zhao, H.; Fan, F.; Liu, G.; Xu, Q.; Nazir, S. An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs. Sensors 2022 , 22 , 1407. [ Google Scholar ] [ CrossRef ]
  • Archana Janani, K.; Vetriselvi, V.; Parthasarathi, R.; Subrahmanya VRK Rao, G. An Approach to URL Filtering in SDN. In Lecture Notes on Data Engineering and Communications Technologies ; Smys, S., Bestak, R., Chen, J.I.-Z., Kotuliak, I., Eds.; Springer: Singapore, 2019; Volume 15, pp. 217–228. ISBN 978-981-10-8680-9. [ Google Scholar ] [ CrossRef ]
  • Miao, M.; Wu, B. A Flexible Phishing Detection Approach Based on Software-Defined Networking Using Ensemble Learning Method. In Proceedings of the 2020 4th International Conference on High Performance Compilation, Computing and Communications, Guangzhou, China, 27–29 June 2020; pp. 70–73. [ Google Scholar ] [ CrossRef ]
  • Chin, T.; Xiong, K.; Hu, C. Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking. IEEE Access 2018 , 6 , 42513–42531. [ Google Scholar ] [ CrossRef ]
  • Wazirali, R.; Ahmad, R.; Abu-Ein, A.A.-K. Sustaining accurate detection of phishing URLs using SDN and feature selection approaches. Comput. Netw. 2021 , 201 , 108591. [ Google Scholar ] [ CrossRef ]
  • Emperuman, M.; Chandrasekaran, S. Hybrid continuous density hmm-based ensemble neural networks for sensor fault detection and classification in wireless sensor network. Sensors 2020 , 20 , 745. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Zidi, S.; Moulahi, T.; Alaya, B. Fault detection in wireless sensor networks through SVM classifier. IEEE Sens. J. 2018 , 18 , 340–347. [ Google Scholar ] [ CrossRef ]
  • Tran, D.A.; Nguyen, T. Localization In Wireless Sensor Networks Based on Support Vector Machines. IEEE Trans. Parallel Distrib. Syst. 2008 , 19 , 981–994. [ Google Scholar ] [ CrossRef ]
  • Sun, Q.; Sun, Y.; Liu, X.; Xie, Y.; Chen, X. Study on fault diagnosis algorithm in WSN nodes based on RPCA model and SVDD for multi-class classification. Cluster Comput. 2019 , 22 , 6043–6057. [ Google Scholar ] [ CrossRef ]
  • Chanak, P.; Banerjee, I. Fuzzy rule-based faulty node classification and management scheme for large scale wireless sensor networks. Expert Syst. Appl. 2016 , 45 , 307–321. [ Google Scholar ] [ CrossRef ]
  • Yang, X.; Chen, X.; Xia, R.; Qian, Z. Wireless sensor network congestion control based on standard particle swarm optimization and single neuron PID. Sensors 2018 , 18 , 1265. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Srivastava, V.; Tripathi, S.; Singh, K.; Son, L.H. Energy efficient optimized rate based congestion control routing in wireless sensor network. J. Ambient Intell. Humaniz. Comput. 2020 , 11 , 1325–1338. [ Google Scholar ] [ CrossRef ]
  • Qu, S.; Zhao, L.; Xiong, Z. Cross-layer congestion control of wireless sensor networks based on fuzzy sliding mode control. Neural Comput. Appl. 2020 , 32 , 13505–13520. [ Google Scholar ] [ CrossRef ]
  • Alshrif, F.F.; Sundararajan, E.A.; Ahmad, R.; Alkhatib, Y. New Framework for Authentication and key Establishment to Secure 6LoWPAN Networks. In Proceedings of the 2021 International Conference on Electrical Engineering and Informatics (ICEEI), Nanjing, China, 3–5 December 2021; IEEE: Selangor, Malaysia, 2021; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Wiener, M.J. Cryptanalysis of short RSA secret exponents. Lect. Notes Comput. Sci. 1990 , 434 LNCS , 372. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Lepech, M.D.; Li, V.C. Application of ECC for bridge deck link slabs. Mater. Struct. Constr. 2009 , 42 , 1185–1195. [ Google Scholar ] [ CrossRef ]
  • Ullah, I.; Alkhalifah, A.; Rehman, S.U.; Kumar, N.; Khan, M.A. An Anonymous Certificateless Signcryption Scheme for Internet of Health Things. IEEE Access 2021 , 9 , 101207–101216. [ Google Scholar ] [ CrossRef ]
  • Moon, A.H.; Iqbal, U.; Bhat, G.M. Light weight Authentication Framework for WSN. In Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March 2016; pp. 3099–3105. [ Google Scholar ] [ CrossRef ]
  • Das, R.; Gadre, A.; Zhang, S.; Kumar, S.; Moura, J.M.F. A Deep Learning Approach to IoT Authentication. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018. [ Google Scholar ] [ CrossRef ]
  • Fang, H.; Wang, X.; Hanzo, L. Learning-Aided Physical Layer Authentication as an Intelligent Process. IEEE Trans. Commun. 2019 , 67 , 2260–2273. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Ashibani, Y.; Mahmoud, Q.H. A Machine Learning-Based User Authentication Model Using Mobile App Data ; Springer: Cham, Switzerland, 2020; Volume 1029, ISBN 9783030237554. [ Google Scholar ] [ CrossRef ]
  • Ashibani, Y.; Mahmoud, Q.H. A Behavior-Based Proactive User Authentication Model Utilizing Mobile Application Usage Patterns. Lect. Notes Comput. Sci. 2019 , 11489 LNAI , 284–295. [ Google Scholar ] [ CrossRef ]
  • Ashibani, Y.; Mahmoud, Q.H. User authentication for smart home networks based on mobile apps usage. In Proceedings of the 2019 28th International Conference on Computer Communication and Networks (ICCCN), Valencia, Spain, 29 July–1 August 2019; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Canedo, J.; Skjellum, A. Using machine learning to secure IoT systems. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016; pp. 219–222. [ Google Scholar ] [ CrossRef ]
  • Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, A.R.; Tarkoma, S. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017; pp. 2177–2184. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Meidan, Y.; Bohadana, M.; Shabtai, A.; Guarnizo, J.D.; Ochoa, M.; Tippenhauer, N.O.; Elovici, Y. ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis. In Proceedings of the Symposium on Applied Computing, Marrakech, Morocco, 3–7 April 2017. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • O’Mahony, G.D.; Harris, P.J.; Murphy, C.C. Detecting Interference in Wireless Sensor Network Received Samples: A Machine Learning Approach. In Proceedings of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020. [ Google Scholar ] [ CrossRef ]
  • Ahmad, R.; Sundararajan, E.A.; Khalifeh, A. A survey on femtocell handover management in dense heterogeneous 5G networks. Telecommun. Syst. 2020 , 75 , 481–507. [ Google Scholar ] [ CrossRef ]
  • Luo, S.; Li, H.; Wen, Z.; Qian, B.; Morgan, G.; Longo, A.; Rana, O.; Ranjan, R. Blockchain-Based Task Offloading in Drone-Aided Mobile Edge Computing. IEEE Netw. 2021 , 35 , 124–129. [ Google Scholar ] [ CrossRef ]
  • Abdelwahab, S.; Hamdaoui, B.; Guizani, M.; Znati, T. Network function virtualization in 5G. IEEE Commun. Mag. 2016 , 54 , 84–91. [ Google Scholar ] [ CrossRef ]
  • Barakabitze, A.A.; Ahmad, A.; Mijumbi, R.; Hines, A. 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Comput. Netw. 2020 , 167 , 106984. [ Google Scholar ] [ CrossRef ]
  • Isyaku, B.; Mohd Zahid, M.S.; Bte Kamat, M.; Abu Bakar, K.; Ghaleb, F.A. Software Defined Networking Flow Table Management of OpenFlow Switches Performance and Security Challenges: A Survey. Futur. Int. 2020 , 12 , 147. [ Google Scholar ] [ CrossRef ]
  • Arulkumaran, K.; Deisenroth, M.P.; Brundage, M.; Bharath, A.A. Deep reinforcement learning: A brief survey. IEEE Signal Process. Mag. 2017 , 34 , 26–38. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Tan, C.; Sun, F.; Kong, T.; Zhang, W.; Yang, C.; Liu, C. A Survey on Deep Transfer Learning. In International Conference on Artificial Neural Networks ; Springer: Cham, Switzerland, 2018; Volume 11141, pp. 270–279. ISBN 9783030014230. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Awais Javed, M.; Zeadally, S.; Hamid, Z. Trust-based security adaptation mechanism for Vehicular Sensor Networks. Comput. Netw. 2018 , 137 , 27–36. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

Security InfrastructureAttacks
Confidentiality Hole, Sybil, Spoofing, Session hijacking, Repudiation, Selective forwarding, Spoofing
IntegrityEavesdropping, traffic analysis, Selective forwarding, Spoofing
Availability DoS, Exhaustion, Jamming, Collision, Unfairness
Security InfrastructureAttacks
Confidentiality Encryption
IntegrityDigital signature, MAC
Availability Traffic control, redundancy, Rerouting
Non-repudiationDigital certificate
No.Challenges
1.Accurate real-time predictions
2.The use of ML does not cover all the security requirements of WSNs
3.Outputs are approx.
Refs.ML TechniqueProcessing CostError DetectedAccuracyLimitations
[ ]SVM, KNN, and RNNRelativeOffset, gain, stuck-at, and out of bounds97%Calculating the reliability of the decision is complex
[ ]hidden Markov model + Neural networks (NNs)highRandom, drift, and spike96%Training speed is slow
[ ]SVMLowNegative alerts99%Does not consider the load management between nodes
[ ]SVMHighFault WSN nodes98%Not suitable for large networks
[ ]SVM + principal component analysisHighFault WSN nodes99%complexity is high
[ ]BayesianHighFault WSN nodes70%Bayesian increases the complexity of the WSN devices
[ ]BayesianHighFault WSN nodes100%It takes more time to detect due to the use of two different detection systems
[ ]KNNModerateFault WSN nodes99%Not cover continuous change in WSN topology
Refs.ML TechniqueProcessing CostControl PolicyDetection Criteria
[ ]Fuzzy logicLowQueue managementBuffer occupancy
[ ]Fuzzy logicmoderateQueue managementbuffer occupancy
[ ]Fuzzy logic HighTraffic controlBuffer occupancy
[ ]Heuristic and Fuzzy logicHighTraffic controlChannel load
[ ]K-mean, Firefly, and ant colonyHighTraffic controlPacket service time
[ ]Fuzzy logicLowTraffic controlBuffer occupancy
Refs.ML TechniqueProcessing CostAttackAccuracyLimitations
[ ]ANNHighMan in the Middle99%It needs huge data sets
[ ]Random ForestLowTraffic monitoring (identification)96%Not expandable
[ ]Binary classifierLowTraffic monitoring (identification)95%Centralization of classification
[ ]k-mean + SVMModerateMalicious nodeNACentralization of classification
[ ]Random forestLowPrivacyNARequire large memory for storage
[ ]Random Forest + SVMModerateChannel identificationNANot effective for large networks
MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

Ahmad, R.; Wazirali, R.; Abu-Ain, T. Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors 2022 , 22 , 4730. https://doi.org/10.3390/s22134730

Ahmad R, Wazirali R, Abu-Ain T. Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors . 2022; 22(13):4730. https://doi.org/10.3390/s22134730

Ahmad, Rami, Raniyah Wazirali, and Tarik Abu-Ain. 2022. "Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues" Sensors 22, no. 13: 4730. https://doi.org/10.3390/s22134730

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

AIP Publishing Logo

A comprehensive review of wireless sensor networks: Applications, challenges, radio technologies, and protocols

  • Article contents
  • Figures & tables
  • Supplementary Data
  • Peer Review
  • Reprints and Permissions
  • Cite Icon Cite
  • Search Site

Fadhil Mohammad Salman; A comprehensive review of wireless sensor networks: Applications, challenges, radio technologies, and protocols. AIP Conf. Proc. 4 December 2023; 2834 (1): 020021. https://doi.org/10.1063/5.0161523

Download citation file:

  • Ris (Zotero)
  • Reference Manager

Recently, significant advances in digital sensing technology and wireless communications have led to the production of small-scale smart sensors that have the ability to sense physical changes in different environments and convert them into digital signals that are collected in one central location. These networks are called wireless sensor networks (WSNs) because they have the ability to wirelessly communicate with each other for the purpose of passing data between them and deliver it to the central station. Wireless sensor networks have great importance in human environments, as they are used to monitor and record physical changes in environments that are not accessible to humans, such as environments with very high temperatures, or in cases of chemical environmental pollution, in forests and seas as well as in deep layers of earth to monitor seismic and volcanic activity. In view of the great importance of wireless sensor networks and their obvious impact on human life, and for the purpose of providing researchers with brief and complete information about these networks, we have presented this paper that briefly reviews what sensor networks are, their specifications, applications and the challenges they face. This paper also included most of the radio communication techniques used in sensor architectures. As well as touching on the most important routing algorithms in "WSNs" and their classifications with a comparison of their performance. Finally, this paper provided an overview of research trends that could lead to significant technological development and beneficial growth to overcome the challenges of wireless sensor networks.

Citing articles via

Publish with us - request a quote.

ieee research paper on sensor network

Sign up for alerts

  • Online ISSN 1551-7616
  • Print ISSN 0094-243X
  • For Researchers
  • For Librarians
  • For Advertisers
  • Our Publishing Partners  
  • Physics Today
  • Conference Proceedings
  • Special Topics

pubs.aip.org

  • Privacy Policy
  • Terms of Use

Connect with AIP Publishing

This feature is available to subscribers only.

Sign In or Create an Account

Wireless Sensor Networks

Featured article, related topics, top conferences on wireless sensor networks, top videos on wireless sensor networks.

Wireless Sensor Networks

Xplore Articles related to Wireless Sensor Networks

Periodicals related to wireless sensor networks, e-books related to wireless sensor networks, courses related to wireless sensor networks, standards related to wireless sensor networks, top organizations on wireless sensor networks, most published xplore authors for wireless sensor networks.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

IMAGES

  1. IEEE Paper Format

    ieee research paper on sensor network

  2. IEEE Sensors Journal template

    ieee research paper on sensor network

  3. Embedded IEEE Papers

    ieee research paper on sensor network

  4. 实验室学术论文在IEEE Sensors Journal发表-厦门市数据安全与区块链技术重点实验室

    ieee research paper on sensor network

  5. (PDF) The research of an advanced wireless sensor networks for agriculture

    ieee research paper on sensor network

  6. A wireless sensor network for structural health monitoring: performance

    ieee research paper on sensor network

VIDEO

  1. HP 107a Paper Sensor Repair.!!! #HP107a #sensor

  2. Issues and Challenges In Wireless Sensor Networks

  3. A publication roadmap to an IEEE research paper

  4. How to Download IEEE Research Paper Free By Prof Abhijit Kalbande

  5. Towards Dense and Scalable Soil Sensing Through Low-Cost WiFi Sensing Networks

  6. Sensor networks in IOT || FIOT || Internet of things || CSE || JNTUH

COMMENTS

  1. A Security and Application of Wireless Sensor Network: A ...

    This paper presents a comprehensive review of the current state of research in WSN s, focusing on aspects such as network architecture, communication protocols, energy management techniques, data processing and fusion, security and privacy, and applications.

  2. Sensor networks: evolution, opportunities, and challenges

    This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spanning this period: the Distributed Sensor Networks (DSN) and the Sensor Information Technology (SensIT) programs.

  3. Wireless Sensor Networks (WSNs) - IEEE Xplore

    Over the past two decades Wireless Sensor Networks (WSNs) and their applications have been the topic of many studies. WSN is a network responsible for collecting, processing and distributing wireless data to the intended database storage center.

  4. Machine Learning in Wireless Sensor Networks for Smart ... - MDPI

    The small size IoT nodes based on low power Bluetooth (IEEE 802.15.1) standard and wireless sensor networks (WSN) (IEEE 802.15.4) standard are generally used for transmission of data to a remote location using gateways.

  5. IEEE 802.11 and Wireless Sensors Network - MDPI

    IEEE 802.11s, IEEE 802.11ah (Wi-Fi HaLow), IEEE 802.11ba, and several features included in the IEEE 802.11ax (Wi-Fi 6) and under discussion for the future IEEE 802.11be (Wi-Fi 7), focus on improving the performance of Wi-Fi in a sensor network, or in an IoT scenario.

  6. wireless sensor networks Archives - IEEE Access

    This paper describes many of the technical challenges and opportunities for wireless communication and sensing applications above 100 GHz, and presents a number of promising discoveries, novel approaches, and recent results that will aid in the development and implementation of the sixth generation (6G) of wireless networks, and beyond.

  7. Machine Learning for Wireless Sensor Networks Security: An ...

    Machine learning algorithms present additional hurdles in terms of training and the amount of data required for training. This paper provides a convenient reference for wireless sensor network infrastructure and the security challenges it faces.

  8. A comprehensive review of wireless sensor networks ...

    Handbook of research on advanced wireless sensor network applications, protocols, and architectures.

  9. Wireless Sensor Networks on IEEE Technology Navigator

    Research on data privacy protection algorithm with homomorphism mechanism based on redundant slice technology in **wireless sensor networks**. Design and optimization of a cross-layer routing protocol for multi-hop **wireless sensor networks**.

  10. Machine Learning in Wireless Sensor Networks: A Retrospective

    In this paper, a review on the Machine Learning techniques that can be applied on these networks is presented. These networks are the most trending technologies for some real applications because of its features such as low-cost, tiny and mobility.