{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:01:04Z","timestamp":1774965664269,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T00:00:00Z","timestamp":1703721600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T00:00:00Z","timestamp":1703721600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17894-2","type":"journal-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T06:01:56Z","timestamp":1703743316000},"page":"58915-58934","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Anomaly detection in WSN IoT (Internet of Things) environment through a consensus-based anomaly detection approach"],"prefix":"10.1007","volume":"83","author":[{"given":"Anitha","family":"C L","sequence":"first","affiliation":[]},{"given":"R.","family":"Sumathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,28]]},"reference":[{"issue":"4","key":"17894_CR1","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/TCYB.2018.2804940","volume":"49","author":"X Miao","year":"2019","unstructured":"Miao X, Liu Y, Zhao H, Li C (2019) Distributed online one-class support vector machine for anomaly detection over networks. IEEE Trans Cybern 49(4):1475\u20131488. https:\/\/doi.org\/10.1109\/TCYB.2018.2804940","journal-title":"IEEE Trans Cybern"},{"issue":"2","key":"17894_CR2","doi-asserted-by":"publisher","first-page":"2205","DOI":"10.1109\/JIOT.2018.2883403","volume":"6","author":"H Xie","year":"2019","unstructured":"Xie H, Yan Z, Yao Z, Atiquzzaman M (2019) Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet Things J 6(2):2205\u20132224. https:\/\/doi.org\/10.1109\/JIOT.2018.2883403","journal-title":"IEEE Internet Things J"},{"key":"17894_CR3","doi-asserted-by":"publisher","unstructured":"Dang T-B, Le D-T, Nguyen T-D, Kim M, Choo H (2021) Monotone split and conquer for anomaly detection in IoT sensory data. IEEE Internet Things J 8(20):15468\u201315485. https:\/\/doi.org\/10.1109\/JIOT.2021.3073705","DOI":"10.1109\/JIOT.2021.3073705"},{"key":"17894_CR4","doi-asserted-by":"publisher","first-page":"169548","DOI":"10.1109\/ACCESS.2020.3024219","volume":"8","author":"S Jiang","year":"2020","unstructured":"Jiang S, Zhao J, Xu X (2020) SLGBM: an intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 8:169548\u2013169558. https:\/\/doi.org\/10.1109\/ACCESS.2020.3024219","journal-title":"IEEE Access"},{"key":"17894_CR5","doi-asserted-by":"publisher","unstructured":"Islam K, Shen W, Wang X (2012) Wireless sensor network reliability and security in factory automation: a survey. IEEE Trans Syst Man Cybern Part C (Appl Rev) 42(6):1243-1256. https:\/\/doi.org\/10.1109\/TSMCC.2012.2205680","DOI":"10.1109\/TSMCC.2012.2205680"},{"key":"17894_CR6","doi-asserted-by":"publisher","unstructured":"Abduvaliyev A, Pathan AK, Zhou J, Roman R, Wong W (2013) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 15(3):1223\u20131237. https:\/\/doi.org\/10.1109\/SURV.2012.121912.00006","DOI":"10.1109\/SURV.2012.121912.00006"},{"issue":"5","key":"17894_CR7","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/JIOT.2019.2961839","volume":"7","author":"S Yao","year":"2020","unstructured":"Yao S, Li Z, Guan J, Liu Y (2020) Stochastic cost minimization mechanism based on identifier network for IoT security. IEEE Internet Things J 7(5):3923\u20133934. https:\/\/doi.org\/10.1109\/JIOT.2019.2961839","journal-title":"IEEE Internet Things J"},{"key":"17894_CR8","doi-asserted-by":"publisher","first-page":"4092","DOI":"10.1109\/TIFS.2021.3101051","volume":"16","author":"SS Desai","year":"2021","unstructured":"Desai SS, Nene MJ (2021) Multihop trust evaluation using memory integrity in wireless sensor networks. IEEE Trans Inf Forensics Secur 16:4092\u20134100. https:\/\/doi.org\/10.1109\/TIFS.2021.3101051","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"17894_CR9","doi-asserted-by":"publisher","unstructured":"Laouira ML, Abdelli A, Othman JB, Kim H (2021) An efficient WSN based solution for border surveillance. IEEE Trans Sustain Comput 6(1):54\u201365. https:\/\/doi.org\/10.1109\/TSUSC.2019.2904855","DOI":"10.1109\/TSUSC.2019.2904855"},{"issue":"3","key":"17894_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","volume":"6","author":"M Mohy-Eddine","year":"2023","unstructured":"Mohy-Eddine M, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y (2023) An ensemble learning based intrusion detection model for industrial IoT security. Big Data Min Anal 6(3):273\u2013287. https:\/\/doi.org\/10.26599\/BDMA.2022.9020032","journal-title":"Big Data Min Anal"},{"key":"17894_CR11","doi-asserted-by":"publisher","first-page":"7488","DOI":"10.3390\/app13137488","volume":"13","author":"S Amaouche","year":"2023","unstructured":"Amaouche S, Guezzaz A, Benkirane S, Azrour M, Khattak SBA, Farman H, Nasralla MM (2023) FSCB-IDS: feature selection and minority class balancing for attacks detection in VANETs. Appl Sci 13:7488. https:\/\/doi.org\/10.3390\/app13137488","journal-title":"Appl Sci"},{"key":"17894_CR12","doi-asserted-by":"publisher","first-page":"23615","DOI":"10.1007\/s11042-023-14795-2","volume":"82","author":"M Mohy-eddine","year":"2023","unstructured":"Mohy-eddine M, Guezzaz A, Benkirane S et al (2023) An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimed Tools Appl 82:23615\u201323633. https:\/\/doi.org\/10.1007\/s11042-023-14795-2","journal-title":"Multimed Tools Appl"},{"key":"17894_CR13","doi-asserted-by":"publisher","first-page":"3392","DOI":"10.1007\/s11227-022-04783-y","volume":"79","author":"M Douiba","year":"2023","unstructured":"Douiba M, Benkirane S, Guezzaz A et al (2023) An improved anomaly detection model for IoT security using decision tree and gradient boosting. J Supercomput 79:3392\u20133411. https:\/\/doi.org\/10.1007\/s11227-022-04783-y","journal-title":"J Supercomput"},{"key":"17894_CR14","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s11416-022-00456-9","volume":"19","author":"M Mohy-eddine","year":"2023","unstructured":"Mohy-eddine M, Guezzaz A, Benkirane S et al (2023) An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J Comput Virol Hack Tech 19:469\u2013481. https:\/\/doi.org\/10.1007\/s11416-022-00456-9","journal-title":"J Comput Virol Hack Tech"},{"key":"17894_CR15","doi-asserted-by":"publisher","unstructured":"Hazman C, Guezzaz A, Benkirane S, Azrour M (2022) lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Comput 26. https:\/\/doi.org\/10.1007\/s10586-022-03810-0","DOI":"10.1007\/s10586-022-03810-0"},{"issue":"2","key":"17894_CR16","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"HH Pajouh","year":"2019","unstructured":"Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-K-R (2019) A two\u2013layer dimension reduction and two\u2013tier classification model for anomaly\u2013based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7(2):314\u2013323","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"17894_CR17","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.future.2019.02.064","volume":"96","author":"W Li","year":"2019","unstructured":"Li W, Tug S, Meng W, Wang Y (2019) Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener Comput Syst 96:481\u2013489","journal-title":"Future Gener Comput Syst"},{"key":"17894_CR18","doi-asserted-by":"crossref","unstructured":"Breitenbacher D, Homoliak I, Aung YL, Tippenhauer NO, Elovici Y (2019) HADES-IoT: A practical host-based anomaly detection system for IoT devices. In: Proc. ACM Asia Conf. Comput. Commun. Secur., Auckland, New Zealand, pp 479\u2013484","DOI":"10.1145\/3321705.3329847"},{"key":"17894_CR19","doi-asserted-by":"crossref","unstructured":"Mudgerikar A, Sharma P, Bertino E (2019) E-spion: A system-level intrusion detection system for iot devices. In: Proc. ACM Asia Conf. Comput. Commun. Secur., Auckland, New Zealand, pp 493\u2013500","DOI":"10.1145\/3321705.3329857"},{"key":"17894_CR20","doi-asserted-by":"publisher","unstructured":"Abououf M, Mizouni R, Singh S, Otrok H, Damiani E (2022) Self-supervised online and lightweight anomaly and event detection for IoT devices. In: IEEE Internet Things J 9(24):25285\u201325299. https:\/\/doi.org\/10.1109\/JIOT.2022.3196049","DOI":"10.1109\/JIOT.2022.3196049"},{"issue":"1","key":"17894_CR21","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TSMC.2020.2968516","volume":"52","author":"C Yin","year":"2022","unstructured":"Yin C, Zhang S, Wang J, Xiong NN (2022) Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans Syst Man Cybern Syst 52(1):112\u2013122. https:\/\/doi.org\/10.1109\/TSMC.2020.2968516","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"17894_CR22","doi-asserted-by":"publisher","unstructured":"Sharma M, Elmiligi H, Gebali F (2021) A novel intrusion detection system for RPL-based cyber\u2013physical systems. IEEE Can J Electr Comput Eng 44(2):246\u2013252. https:\/\/doi.org\/10.1109\/ICJECE.2021.3053231","DOI":"10.1109\/ICJECE.2021.3053231"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17894-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17894-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17894-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T09:35:14Z","timestamp":1717407314000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17894-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,28]]},"references-count":22,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["17894"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17894-2","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,28]]},"assertion":[{"value":"19 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}