Research Article
Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network
Table 1
List of abbreviations and acronyms used in this paper.
| | Abbreviations | Descriptions |
| | BS | Base station | | WSNs | Wireless sensor networks | | CH | Cluster head | | D | Distance | | E | Energy of the sensor node | | RSSI | Received signal strength indicator | | DV-H | Distance vector hop | | IoT | Internet of Things | | ANN-IDS | Artificial neural network-based intrusion detection system | | FEMs | Fuzzy extreme machines | | MK-ELM | Multikernel extreme learning machine | | LEACH-ANN | Low-energy adaptive clustering hierarchy based on ANN | | CNN-MCL | Convolutional neural network and mean convolutional layer | | HTM-LSTM | Hierarchical temporal memory and long short-term memory | | MLPANN | Multilayer perceptron artificial neural network | | RL-IDS | Reinforcement learning-based IDS | | GBFS-IDS | Gradient boosting feature selection for IDS | | ML-ID | Machine learning-based intrusion detection | | UWB | Ultrawide band | | DI-ADS | Deep intelligent attack detection scheme | | PO-CFNN- | Political optimizer based on cascade forward neural network | | RNN | Recurrent neural network | | ECGAL | Energy-efficient clustering and localization centered on genetic algorithm | | LSTM-FFNN | Long short-term memory and feed-forward neural network | | DNN-CSO | Deep neural networks with chicken swarm optimization |
|
|