Research Article
Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network
Table 1
List of abbreviations and acronyms used in this paper.
| Abbreviations | Descriptions |
| BS | Base station | WSNs | Wireless sensor networks | CH | Cluster head | D | Distance | E | Energy of the sensor node | RSSI | Received signal strength indicator | DV-H | Distance vector hop | IoT | Internet of Things | ANN-IDS | Artificial neural network-based intrusion detection system | FEMs | Fuzzy extreme machines | MK-ELM | Multikernel extreme learning machine | LEACH-ANN | Low-energy adaptive clustering hierarchy based on ANN | CNN-MCL | Convolutional neural network and mean convolutional layer | HTM-LSTM | Hierarchical temporal memory and long short-term memory | MLPANN | Multilayer perceptron artificial neural network | RL-IDS | Reinforcement learning-based IDS | GBFS-IDS | Gradient boosting feature selection for IDS | ML-ID | Machine learning-based intrusion detection | UWB | Ultrawide band | DI-ADS | Deep intelligent attack detection scheme | PO-CFNN- | Political optimizer based on cascade forward neural network | RNN | Recurrent neural network | ECGAL | Energy-efficient clustering and localization centered on genetic algorithm | LSTM-FFNN | Long short-term memory and feed-forward neural network | DNN-CSO | Deep neural networks with chicken swarm optimization |
|
|