{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T19:38:16Z","timestamp":1778873896976,"version":"3.51.4"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T00:00:00Z","timestamp":1703808000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T00:00:00Z","timestamp":1703808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s10922-023-09794-5","type":"journal-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T12:01:41Z","timestamp":1703851301000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks"],"prefix":"10.1007","volume":"32","author":[{"given":"Anselme Russel Affane","family":"Moundounga","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Satori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,29]]},"reference":[{"key":"9794_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470666388","volume-title":"Fundamentals of Wireless Sensor Networks: Theory and Practice","author":"W Dargie","year":"2010","unstructured":"Dargie, W., Poellabauer, C.: Fundamentals of Wireless Sensor Networks: Theory and Practice. John Wiley & Sons, Beijing (2010)"},{"key":"9794_CR2","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.comnet.2015.03.002","volume":"83","author":"A Nadeem","year":"2015","unstructured":"Nadeem, A., Hussain, M.A., Owais, O., Salam, A., Iqbal, S., Ahsan, K.: Application specific study, analysis and classification of body area wireless sensor network applications. Comput. Netw. 83, 363\u2013380 (2015)","journal-title":"Comput. Netw."},{"key":"9794_CR3","first-page":"37","volume":"1","author":"M Winkler","year":"2008","unstructured":"Winkler, M., Tuchs, K.D., Hughes, K.: Theoretical and practical aspects of military wireless sensor networks. J. Telecommun. Inform. Technol. 1, 37\u201345 (2008)","journal-title":"J. Telecommun. Inform. Technol."},{"issue":"3","key":"9794_CR4","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.adhoc.2009.09.004","volume":"8","author":"C-H Lung","year":"2010","unstructured":"Lung, C.-H., Zhou, C.: Using hierarchical agglomerative clustering in wireless sensor networks: an energy-efficient and flexible approach. Ad Hoc Netw. 8(3), 328\u2013344 (2010)","journal-title":"Ad Hoc Netw."},{"issue":"7","key":"9794_CR5","doi-asserted-by":"publisher","first-page":"5381","DOI":"10.1007\/s00521-022-07970-3","volume":"35","author":"AR Affane","year":"2023","unstructured":"Affane, A.R., Satori, H., Sanhaji, F., Boutazart, Y., Satori, K.: Energy enhancement of routing protocol with hidden Markov model in wireless sensor networks. Neural Comput. Appl. 35(7), 5381\u20135393 (2023)","journal-title":"Neural Comput. Appl."},{"key":"9794_CR6","doi-asserted-by":"crossref","unstructured":"Harb, H., Makhoul, A., Laiymani, D., Jaber, A., Tawil, R.: K-means based clustering approach for data aggregation in periodic sensor networks. In: 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 434\u2013441. IEEE (2014)","DOI":"10.1109\/WiMOB.2014.6962207"},{"issue":"1","key":"9794_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1374-8","volume":"2019","author":"R Wan","year":"2019","unstructured":"Wan, R., Xiong, N., Qinghui, H., Wang, H., Shang, J.: Similarity-aware data aggregation using fuzzy c-means approach for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2019(1), 1\u201311 (2019)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"6","key":"9794_CR8","doi-asserted-by":"publisher","first-page":"3908","DOI":"10.1109\/TWC.2016.2531041","volume":"15","author":"A Morell","year":"2016","unstructured":"Morell, A., Correa, A., Barcel\u00f3, M., Vicario, J.L.: Data aggregation and principal component analysis in wsns. IEEE Trans. Wireless Commun. 15(6), 3908\u20133919 (2016)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"9794_CR9","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4731953","author":"I Almomani","year":"2016","unstructured":"Almomani, I., Al-Kasasbeh, B., Al-Akhras, M.: Wsn-ds: a dataset for intrusion detection systems in wireless sensor networks. J. Sens. (2016). https:\/\/doi.org\/10.1155\/2016\/4731953","journal-title":"J. Sens."},{"key":"9794_CR10","doi-asserted-by":"crossref","unstructured":"Ghadban, N., Honeine, P., Francis, C., Mourad-Chehade, F., Farah, J: Strategies for principal component analysis in wireless sensor networks. In: 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM), pp. 233\u2013236. IEEE (2014)","DOI":"10.1109\/SAM.2014.6882383"},{"issue":"1\u20132","key":"9794_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1504\/IJAHUC.2015.067756","volume":"18","author":"MA Rassam","year":"2015","unstructured":"Rassam, M.A., Zainal, A., Maarof, M.A.: Principal component analysis-based data reduction model for wireless sensor networks. Int. J. Ad Hoc Ubiquit. Comput. 18(1\u20132), 85\u2013101 (2015)","journal-title":"Int. J. Ad Hoc Ubiquit. Comput."},{"issue":"4","key":"9794_CR12","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302\u20131325 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"9794_CR13","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1016\/j.adhoc.2008.06.003","volume":"7","author":"G Anastasi","year":"2009","unstructured":"Anastasi, G., Conti, M., Di Francesco, M., Passarella, A.: Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw. 7(3), 537\u2013568 (2009)","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"9794_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2996356","volume":"49","author":"GM Dias","year":"2016","unstructured":"Dias, G.M., Bellalta, B., Oechsner, S.: A survey about prediction-based data reduction in wireless sensor networks. ACM Comput. Surv. (CSUR) 49(3), 1\u201335 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"23","key":"9794_CR15","doi-asserted-by":"publisher","first-page":"8017","DOI":"10.3390\/s21238017","volume":"21","author":"NM Zamry","year":"2021","unstructured":"Zamry, N.M., Zainal, A., Rassam, M.A., Alkhammash, E.H., Ghaleb, F.A., Saeed, F.: Lightweight anomaly detection scheme using incremental principal component analysis and support vector machine. Sensors 21(23), 8017 (2021)","journal-title":"Sensors"},{"key":"9794_CR16","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore, S., Park, J.H.: Semi-supervised learning based distributed attack detection framework for iot. Appl. Soft Comput. 72, 79\u201389 (2018)","journal-title":"Appl. Soft Comput."},{"issue":"14","key":"9794_CR17","first-page":"2012","volume":"47","author":"C Sundar","year":"2012","unstructured":"Sundar, C., Chitradevi, M., Geetharamani, G.: Classification of cardiotocogram data using neural network based machine learning technique. Int. J. Comput. Appl. 47(14), 2012 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"9794_CR18","doi-asserted-by":"publisher","DOI":"10.1201\/9780429261046","volume-title":"Hidden Markov Models: Theory and Implementation Using MATLAB","author":"JP Coelho","year":"2019","unstructured":"Coelho, J.P.: Hidden Markov Models: Theory and Implementation Using MATLAB. CRC Press, Boca Raton (2019)"},{"key":"9794_CR19","doi-asserted-by":"crossref","unstructured":"Park, T., Cho, D., Kim, H. et\u00a0al.: An effective classification for dos attacks in wireless sensor networks. In: 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 689\u2013692. IEEE (2018)","DOI":"10.1109\/ICUFN.2018.8436999"},{"key":"9794_CR20","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.comnet.2019.06.014","volume":"161","author":"C Titouna","year":"2019","unstructured":"Titouna, C., Na\u00eft-Abdesselam, F., Khokhar, A.: Dods: a distributed outlier detection scheme for wireless sensor networks. Comput. Netw. 161, 93\u2013101 (2019)","journal-title":"Comput. Netw."},{"issue":"1","key":"9794_CR21","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10922-013-9287-z","volume":"23","author":"D McDonald","year":"2015","unstructured":"McDonald, D., Sanchez, S., Madria, S., Ercal, F.: A survey of methods for finding outliers in wireless sensor networks. J. Netw. Syst. Manag. 23(1), 163\u2013182 (2015)","journal-title":"J. Netw. Syst. Manag."},{"issue":"2","key":"9794_CR22","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Meratnia, N., Havinga, P.: Outlier detection techniques for wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 12(2), 159\u2013170 (2010)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"9794_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9794_CR24","doi-asserted-by":"crossref","unstructured":"Sanhaji, F., Satori, H., Satori, K.: Clustering based on neural networks in wireless sensor networks. In: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, pp. 1\u20136, (2017)","DOI":"10.1145\/3167486.3167505"},{"key":"9794_CR25","doi-asserted-by":"crossref","unstructured":"Bettencourt, L., Hagberg, A., Larkey, L.B.: Separating the wheat from the chaff: practical anomaly detection schemes in ecological applications of distributed sensor networks. In: International Conference on Distributed Computing in Sensor Systems, pp. 223\u2013239. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-73090-3_15"},{"key":"9794_CR26","doi-asserted-by":"crossref","unstructured":"Sheng, B., Li, Q., Mao, W., Jin, W.: Outlier detection in sensor networks. In: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 219\u2013228, (2007)","DOI":"10.1145\/1288107.1288137"},{"issue":"1","key":"9794_CR27","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1109\/TII.2020.2964704","volume":"17","author":"A Kavousi-Fard","year":"2020","unstructured":"Kavousi-Fard, A., Wencong, S., Jin, T.: A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Trans. Industr. Inf. 17(1), 650\u2013658 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"9","key":"9794_CR28","doi-asserted-by":"publisher","first-page":"6860","DOI":"10.1007\/s11227-019-03131-x","volume":"76","author":"R Fotohi","year":"2020","unstructured":"Fotohi, R., Bari, S.F.: A novel countermeasure technique to protect wsn against denial-of-sleep attacks using firefly and hopfield neural network (hnn) algorithms. J. Supercomput. 76(9), 6860\u20136886 (2020)","journal-title":"J. Supercomput."},{"key":"9794_CR29","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.017914","author":"B Almaslukh","year":"2021","unstructured":"Almaslukh, B.: Deep learning and entity embedding-based intrusion detection model for wireless sensor networks. Comput. Mater. Contin. (2021). https:\/\/doi.org\/10.32604\/cmc.2021.017914","journal-title":"Comput. Mater. Contin."},{"issue":"3","key":"9794_CR30","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1016\/j.adhoc.2012.11.001","volume":"11","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Meratnia, N., Havinga, P.J.M.: Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine. Ad Hoc Netw. 11(3), 1062\u20131074 (2013)","journal-title":"Ad Hoc Netw."},{"key":"9794_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Meratnia, N., Havinga, P.: Adaptive and online one-class support vector machine-based outlier detection techniques for wireless sensor networks. In: 2009 International Conference on Advanced Information Networking and Applications Workshops, pp. 990\u2013995. IEEE (2009)","DOI":"10.1109\/WAINA.2009.200"},{"key":"9794_CR32","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-00018-9_4","volume-title":"International Conference on Cloud Computing and Security","author":"W Zheng","year":"2018","unstructured":"Zheng, W., Yang, L., Wu, M.: An improved distributed pca-based outlier detection in wireless sensor network. In: International Conference on Cloud Computing and Security, pp. 37\u201349. Springer, Berlin (2018)"},{"key":"9794_CR33","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.01403105","author":"Y Boutazart","year":"2023","unstructured":"Boutazart, Y., Satori, H., Affane, M., Anselme, R., Hamidi, M., Satori, K.: Covid-19 dataset clustering based on k-means and em algorithms. Int. J. Adv. Comput. Sci. Appl. (2023). https:\/\/doi.org\/10.14569\/IJACSA.2023.01403105","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"9794_CR34","doi-asserted-by":"crossref","unstructured":"Jellali, Z., Atallah, L., Cherif, S.: Principal component analysis based clustering approach for wsn with locally uniformly correlated data. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 174\u2013179. IEEE (2019)","DOI":"10.1109\/IWCMC.2019.8766477"},{"key":"9794_CR35","doi-asserted-by":"crossref","unstructured":"Sanhaji, F., Satori, H., Satori, K.: Cluster head selection based on neural networks in wireless sensor networks. In: 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/WITS.2019.8723845"},{"key":"9794_CR36","unstructured":"Taieb Brahim, M. et\u00a0al. Contribution aux R\u00e9seaux Sans fil: Routage \u00e0 base de l\u2019algorithme MCL pour les R\u00e9seaux de Capteurs. PhD thesis, Universit\u00e9 Djillali Liabes de Sidi Bel Abbes, (2021)"},{"key":"9794_CR37","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/427246","author":"G Chen","year":"2012","unstructured":"Chen, G., Tan, L., Gong, Y., Zhang, W.: Pca-guided routing algorithm for wireless sensor networks. J. Comput. Netw. Commun. (2012). https:\/\/doi.org\/10.1155\/2012\/427246","journal-title":"J. Comput. Netw. Commun."},{"issue":"3","key":"9794_CR38","doi-asserted-by":"publisher","first-page":"745","DOI":"10.3390\/s20030745","volume":"20","author":"M Emperuman","year":"2020","unstructured":"Emperuman, M., Chandrasekaran, S.: Hybrid continuous density hmm-based ensemble neural networks for sensor fault detection and classification in wireless sensor network. Sensors 20(3), 745 (2020)","journal-title":"Sensors"},{"issue":"2\u20133","key":"9794_CR39","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2\u20133), 293\u2013315 (2003)","journal-title":"Ad Hoc Netw."},{"key":"9794_CR40","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.procs.2019.01.028","volume":"148","author":"H Kalkha","year":"2019","unstructured":"Kalkha, H., Satori, H., Satori, K.: Preventing black hole attack in wireless sensor network using hmm. Proc. Comput. Sci. 148, 552\u2013561 (2019)","journal-title":"Proc. Comput. Sci."},{"key":"9794_CR41","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.procs.2013.06.155","volume":"19","author":"M Tripathi","year":"2013","unstructured":"Tripathi, M., Gaur, M.S., Laxmi, V.: Comparing the impact of black hole and gray hole attack on leach in wsn. Proc. Comput. Sci. 19, 1101\u20131107 (2013)","journal-title":"Proc. Comput. Sci."},{"key":"9794_CR42","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1016\/j.procs.2016.03.092","volume":"79","author":"P Amish","year":"2016","unstructured":"Amish, P., Vaghela, V.B.: Detection and prevention of wormhole attack in wireless sensor network using aomdv protocol. Proc. Comput. Sci. 79, 700\u2013707 (2016)","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"9794_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-023-00692-w","volume":"10","author":"S Salmi","year":"2023","unstructured":"Salmi, S., Oughdir, L.: Performance evaluation of deep learning techniques for dos attacks detection in wireless sensor network. J. Big Data 10(1), 1\u201325 (2023)","journal-title":"J. Big Data"},{"key":"9794_CR44","unstructured":"Meesookho, C., Narayanan, S., Raghavendra, C.S.: Collaborative classification applications in sensor networks. In: Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002, pp. 370\u2013374. IEEE (2002)"},{"issue":"14","key":"9794_CR45","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.1016\/j.comnet.2009.05.007","volume":"53","author":"CT Calafate","year":"2009","unstructured":"Calafate, C.T., Manzoni, P., Cano, J.-C., Malumbres, M.P.: Markovian-based traffic modeling for mobile ad hoc networks. Comput. Netw. 53(14), 2586\u20132600 (2009)","journal-title":"Comput. Netw."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09794-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-023-09794-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09794-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T01:48:25Z","timestamp":1730944105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-023-09794-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,29]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["9794"],"URL":"https:\/\/doi.org\/10.1007\/s10922-023-09794-5","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,29]]},"assertion":[{"value":"23 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interest"}}],"article-number":"17"}}