References
- Thiruppathi, M., Vinoth Kumar, K. (2023). Seagull optimization-based feature selection with optimal extreme learning machine for intrusion detection in fog assisted WSN. Technical Gazette, 30 (5), 1547–1553.
https://doi.org/10.17559/TV-20230130000295 - Rashid, B., Rehmani, M. H. (2016). Applications of wireless sensor networks for urban areas: A survey. Journal of Network and Computer Applications, 60, 192–219.
https://doi.org/10.1016/j.jnca.2015.09.008 - Kumar, P., Kumar, R., Srivastava, G., Gupta, G. P., Tripathi, R., Gadekallu, T. R., Xiong, N. N. (2021). PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Transactions on Network Science and Engineering, 8 (3), 2326–2341.
https://doi.org/10.1109/TNSE.2021.3089435 - Gopinath, S., Vinoth Kumar, K., Elayaraja, P., Parameswari, A., Balakrishnan, S., Thiruppathi, M. (2021). SCEER: Secure cluster based efficient energy routing scheme for wireless sensor networks. Materials Today: Proceedings, 45 (2), 3579–3584.
https://doi.org/10.1016/j.matpr.2020.12.1096 - Balakrishnan, S., Vinoth Kumar, K. (2023). Hybrid sine-cosine black widow spider optimization based route selection protocol for multihop communication in IoT assisted WSN. Technical Gazette, 30 (4), 1159–1165.
https://doi.org/10.17559/TV-20230201000306 - Kumar S., A. A., Ovsthus, K., Kristensen, L. M. (2014). An industrial perspective on wireless sensor networks — A survey of requirements, protocols, and challenges. IEEE Communications Surveys & Tutorials, 16 (3), 1391–1412.
https://doi.org/10.1109/SURV.2014.012114.00058 - Vinoth Kumar, K., Rajakani, V. (2024). Modeling of intrusion detection system using double adaptive weighting arithmetic optimization algorithm with deep learning on Internet of Things environment. Brazilian Archives of Biology and Technology, 67, e24231010.
https://doi.org/10.1590/1678-4324-2024231010 - Nasir, M., Javed, A. R., Tariq, M. A., Asim, M., Baker, T. (2022). Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. The Journal of Supercomputing, 78, 8852–8866.
https://doi.org/10.1007/s11227-021-04250-0 - Vinoth Kumar, K., Balakrishnan, S. (2023). Multi-objective sand piper optimization based clustering with multihop routing technique for IoT assisted WSN. Brazilian Archives of Biology and Technology, 66, e23220866.
https://doi.org/10.1590/1678-4324-2023220866 - Osterrieder, P., Budde, L., Friedli, T. (2020). The smart factory as a key construct of Industry 4.0: A systematic literature review. International Journal of Production Economics, 221, 107476.
https://doi.org/10.1016/j.ijpe.2019.08.011 - Vinoth Kumar, K., Thiruppathi, M. (2023). Oppositional coyote optimization based sed feature selection with deep learning model for intrusion detection in fog assisted wireless sensor network. Acta Montanistica Slovaca, 28 (2), 496–508.
https://doi.org/10.46544/AMS.v28i2.18 - Deepa, N., Pham, Q.-V., Nguyen, D. C., Bhattacharya, S., Prabadevi, B., Gadekallu, T. R., Maddikunta, P. K. R., Fang, F., Pathirana, P. N. (2022). A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Generation Computer Systems, 131, 209–226.
https://doi.org/10.1016/j.future.2022.01.017 - Rajakani, V., Vinoth Kumar, K. (2023). Barnacles mating optimizer with Hopfield neural network based intrusion detection in Internet of Things environment. Technical Gazette, 30 (6), 1821–1828.
https://doi.org/10.17559/TV-20230414000533 - Pundir, S., Wazid, M., Singh, D. P., Das, A. K., Rodrigues, J. J. P. C., Park, Y. (2019). Intrusion detection protocols in wireless sensor networks integrated to the Internet of Things deployment: Survey and future challenges. IEEE Access, 8, 3343–3363.
https://doi.org/10.1109/ACCESS.2019.2962829 - Ponni, R., JayaSankar, T., Vinoth Kumar, K. (2023). Investigations on underwater acoustic sensor networks framework for RLS enabled LoRa networks in disaster management applications. Journal of Information Science and Engineering, 39 (2), 389–406.
https://doi.org/10.6688/JISE.202303_39(2).0009