1.
RaniyahWazirali, Rami Ahmad, “Machine learning approaches to detect DoS and their effect on WSNs lifetime” Computers, Materials and Continua (2022).
2.
Karen Ávila Paul Sanmartin Daladier Jabba, Javier Gómez, “An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN” Wireless Personal Communications (2022).
3.
Kale NavnathDattatrayaK. Raghava Rao, "Hybrid-based cluster head selection for maximizing network lifetime and energy efficiency in WSN", Journal of King Saud University - Computer and Information Sciences (2022).
4.
P. Gite, K. Chouhan, K. Murali Krishna, C. Kumar Nayak, M. Soni, and A. Shrivastava, “ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers,” Materials Today: Proceedings, 2021, DOI: 10.1016/j.matpr.2021.07.378.
5.
A. Arshad, Z. M. Hanapi, S. Subramaniam, and R. Latip, “A survey of Sybil attack countermeasures in IoT-based wireless sensor networks,” PeerJ Computer Science, vol. 7, 2021, DOI: 10.7717/peerj-cs.673.
6.
B. A. Ashwini and S. S. Manivannan, “Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network,” Optical Memory and Neural Networks (Information Optics), vol. 29, no. 3, 2020, DOI: 10.3103/S1060992X20030029.
7.
R. Fotohi and S. Firoozi Bari, “A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms,” Journal of Supercomputing, vol. 76, no. 9, 2020, DOI: 10.1007/s11227-019-03131-x.
8.
N. Nithiyanandam and P. Latha, “Artificial bee colony-based sinkhole detection in wireless sensor networks,” Journal of Ambient Intelligence and Humanized Computing, 2019, DOI: 10.1007/s12652-019-01404-0.
9.
S. V, “Detection of Localization Error in a WSN under Sybil Attack using Advanced DV-Hop Methodology,” IRO Journal on Sustainable Wireless Systems, vol. 3, no. 2, 2021, DOI: 10.36548/jsws.2021.2.003.
10.
S. Ilavarasan and P. Latha, “Detection and elimination of black hole attack in WSN,” International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 1, 2019, DOI: 10.35940/ijitee.L3908.119119.
11.
S. Singh and H. S. Saini, “Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN,” Wireless Personal Communications, vol. 118, no. 1, 2021, DOI: 10.1007/s11277-020-08044-0.
12.
R. Bhatt, P. Maheshwary, P. Shukla, P. Shukla, M. Shrivastava, and S. Changlani, “Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN),” Computer Communications, vol. 149, 2020, DOI: 10.1016/j.comcom.2019.09.007.
13.
A. Dogra and T. Kaur, “DDOS attack detection and handling mechanism in WSN,” International Journal of Recent Technology and Engineering, vol. 8, no. 3, 2019, DOI: 10.35940/ijrte.C5644.098319.
14.
M. v. Pawar and A. Jagadeesan, “Detection of blackhole and wormhole attacks in WSN enabled by optimal feature selection using self-Adaptive multi-verse optimizer with deep learning," International Journal of Communication Networks and Distributed Systems, vol. 26, no. 4, 2021, DOI: 10.1504/ijcnds.2021.115573.
15.
V. Saini, J. Gupta, and K. D. Garg, “WSN protocols, research challenges in WSN, integrated areas of sensor networks, security attacks in WSN,” European Journal of Molecular and Clinical Medicine, vol. 7, no. 3, 2020.
16.
E. Karakoç and C. Çeken, “Black hole attack prevention scheme using a blockchain-block approach in SDN-enabled WSN,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 37, no. 1, 2021, DOI: 10.1504/IJAHUC.2021.115125.
17.
M. Jeyaselvi, S. Suchitra, M. Sathya, and R. Mekala, “Energy efficient witness based clone and jamming attack detection in wsn,” Journal of Green Engineering, vol. 11, no. 2, 2021.
18.
D. Dhadwal, V. Bhatia, and P. N. Hrisheekesha, “Method & implementation of fault detection & prevention attack in WSN,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 9 Special Issue, 2019, DOI: 10.35940/ijitee.I1126.0789S19.
19.
Y. Wu, B. Kang, and H. Wu, "Strategies of attack–defence game for wireless sensor networks considering the effect of confidence level in fuzzy environment," Engineering Applications of Artificial Intelligence, vol. 102, 2021, DOI: 10.1016/j.engappai.2021.104238.
20.
C. Hongsong, M. Caixia, F. Zhongchuan, and C. H. Lee, "Novel DDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network," IET Information Security, vol. 14, no. 4, 2020, DOI: 10.1049/iet-ifs.2018.5512.
21.
P. D. Halle and S. Shiyamala, “Secure routing through refining reliability for WSN against DOS attacks using AODSD2V2 algorithm for AMI,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 10, 2019, doi: 10.35940/ijitee.I8178.0881019.
22.
S. Godala and R. P. v. Vandella, "A study on intrusion detection system in wireless sensor networks," International Journal of Communication Networks and Information Security, vol. 12, no. 1, 2020.
23.
Y. Prathyusha Reddy, B. Manasa, V. Jyothi, and V. Srikanth, "Detection and defence of DDOS attack for WSN," International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 7, 2019.
24.
M. Alotaibi, “Security to wireless sensor networks against malicious attacks using Hamming residue method,” Eurasip Journal on Wireless Communications and Networking, vol. 2019, no. 1, 2019, DOI: 10.1186/s13638-018-1337-5.
25.
S. Dong, X. gang Zhang, and W. gang Zhou, “A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks,” Journal of Electrical Engineering and Technology, vol. 15, no. 2, 2020, DOI: 10.1007/s42835-020-00361-5.
26.
H. Xie, Z. Yan, Z. Yao, and M. Atiquzzaman, “Data collection for security measurement in wireless sensor networks: A survey,” IEEE Internet of Things Journal, vol. 6, no. 2, 2019, DOI: 10.1109/JIOT.2018.2883403.
27.
M. A. Elsadig, A. Altigani, and M. A. A. Baraka, “Security issues and challenges on wireless sensor networks,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 4, 2019, DOI: 10.30534/ijatcse/2019/78842019.
28.
Basith, K. Abdul, and T. N. Shankar. "Hybrid state analysis with improved firefly optimized linear congestion models of WSNs for DDOS & CRA attacks." PeerJ Computer Science 8 (2022): e845.
29.
S. Nosratian, M. Moradkhani, and M. B. Tavakoli, “Fuzzy-Based Reliability Prediction Model for Secure Routing Protocol Using GA and TLBO for Implementation of Black Hole Attacks in WSN,” Journal of Circuits, Systems and Computers, vol. 30, no. 6, 2021, DOI: 10.1142/S0218126621500985.
30.
M. A. Rizvi, S. Moontaha, K. A. Trisha, S. T. Cynthia, and S. Ripon, "Data mining approach to analyzing intrusion detection of a wireless sensor network," Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 1, 2021, DOI: 10.11591/ijeecs.v21.i1.pp516-523.