There is a vast array of fields making use of WSN, including healthcare, transportation, combat, surveillance, environment, and more. Their limited energy resources, communication capabilities, and processing power de...
详细信息
ISBN:
(纸本)9798350375442
There is a vast array of fields making use of WSN, including healthcare, transportation, combat, surveillance, environment, and more. Their limited energy resources, communication capabilities, and processing power define them. Because of their design and placement in dangerous, unsupervised areas, they are susceptible to assaults. The network's overall security is being enhanced with the introduction of new techniques. The three mainstays of WSN security - intrusion prevention, intrusion detection, and mitigation - are usually implemented together. The Intrusion Detection System (IDS), the second line of defense in a wireless sensor network, receives the algorithms and schemes needed to detect intrusions at various levels from this study. Hierarchical sensor networks, which are the building blocks of this study's sensor network design, include clustering and a tree-like structure for communication with the base station. At each architectural level - the node, the cluster head, and the base station - a hybrid intrusion detection system is deployed. The data modification assault was detected with the use of temporal correlations of sensor signals in the node level intrusion detection system. To identify the discrepancy between the detected value and the threshold value, data anomaly is calculated, updated, and compared. Accuracy and precision are considered while deciding on a threshold value. Handling data with care. The cluster-level intrusion detection system uses the Radial Basis function to identify malicious patterns, malicious flooding assaults, and selfish misbehavior. In order to minimize the number of iterations required for RBF training, the optimization techniques of Self Organizing Map and Particle Swarm Optimization are used. The perfect RBF is taught to identify sinkhole attacks, anomalous behavior, selective forwarding, and self-serving misconduct in base station intrusion detection systems. In order to coordinate the three IDS and identify the assaul
The increasing population, climate fluctuations, soil erosion, limited water resources, and concerns about food security highlight the need for effective and sustainable approaches to food production. Aquaponics repre...
详细信息
The trend towards more data-intensive communication patterns that are required by many applications in the energy domain leads to having to deploy and manage a large number of devices that collect or forward data. Thi...
详细信息
ISBN:
(纸本)9798350384697;9798350384680
The trend towards more data-intensive communication patterns that are required by many applications in the energy domain leads to having to deploy and manage a large number of devices that collect or forward data. This is challenging, because the physical device locations are often inaccessible, users often do not have the required expertise, and configuration inconsistencies can lead to communication disruptions. We propose an open-source automated deployment approach for a customizable Raspberry Pi based hardware and software stack including fleet management for creating large networks of geographically distributed measurement and communication devices capable of being used for a variety of use cases. We show how our approach reduces the amount of interactions required during deployment and helps to manage large amounts of devices by using two example deployments in the energy domain: Firstly, a scalable deployment of distributed measurement devices for gathering insights of the power grid state or of individual grid connected devices. Secondly, Co-Simulation Gateways that connect distributed simulation infrastructure to perform large co-simulations.
The Change Detection (CD) in high-resolution images is significant for understanding the surface of land. There have developed numerous Deep Learning (DL) approaches to CD, many of these algorithms failed to predict e...
详细信息
When distributed photovoltaic systems are integrated into the distribution network, they alter the load characteristics of traditional distribution networks and introduce the characteristics of bidirectional flow. In ...
详细信息
This paper presents an optimized implementation of the Apriori algorithm tailored for large-scale data mining in cloud-native, serverless environments, utilizing real-world fuel datasets. Our approach achieves a 28% r...
详细信息
This research investigates the limitations of current quantum hardware in fulfilling the computational demands of quantum neural networks. It introduces an optimized circuit computed method leveraging bit splitting wi...
详细信息
In recent years, the frequent occurrence of phishing scams on Ethereum has posed serious threats to transaction security and the financial safety of users. This paper proposes an Ethereum phishing scam detection metho...
详细信息
The increasing integration of distributed Energy Resources (DERs) into modern power grids presents challenges in maintaining energy efficiency, grid stability, and cost-effectiveness. To address these challenges, this...
详细信息
In the realm of cybersecurity for cyber-physical systems (CPS), the need for robust and efficient intrusion detection mechanisms has become increasingly critical. The existing CPS had limited processing capabilities o...
详细信息
暂无评论