{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:44:46Z","timestamp":1774554286488,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11277-021-08545-6","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T20:48:26Z","timestamp":1620074906000},"page":"2545-2560","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Defense Countermeasures for DoS Attacks in WSNs Using Deep Radial Basis Networks"],"prefix":"10.1007","volume":"120","author":[{"given":"M.","family":"Premkumar","sequence":"first","affiliation":[]},{"given":"T. V. P.","family":"Sundararajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,3]]},"reference":[{"issue":"3","key":"8545_CR1","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1109\/TIFS.2012.2189568","volume":"7","author":"S Roy","year":"2012","unstructured":"Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(3), 1040\u20131052","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"8545_CR2","doi-asserted-by":"publisher","first-page":"2242","DOI":"10.1109\/COMST.2015.2457491","volume":"17","author":"N Hoque","year":"2015","unstructured":"Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2015). Botnet in DDoS attacks: trends and challenges. IEEE Communications Surveys and Tutorials, 17(4), 2242\u20132270","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"8","key":"8545_CR3","doi-asserted-by":"publisher","first-page":"7236","DOI":"10.3390\/s100807236","volume":"10","author":"AJ Garcia-Sanchez","year":"2010","unstructured":"Garcia-Sanchez, A. J., Garcia-Sanchez, F., Losilla, F., Kulakowski, P., Garcia-Haro, J., Rodr\u00edguez, A., & Palomares, F. (2010). Wireless sensor network deployment for monitoring wildlife passages. Sensors, 10(8), 7236\u20137262","journal-title":"Sensors"},{"key":"8545_CR4","doi-asserted-by":"crossref","unstructured":"Chinrungrueng, J., Sununtachaikul, U., & Triamlumlerd, S. (2006). A vehicular monitoring system with power-efficient wireless sensor networks. International Conference on ITS Telecommunications\u00a0(pp. 951-954). IEEE","DOI":"10.1109\/ITST.2006.288711"},{"issue":"7","key":"8545_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: mirai and other botnets. Computer, 50(7), 80\u201384","journal-title":"Computer"},{"issue":"13","key":"8545_CR6","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1016\/j.comcom.2006.02.011","volume":"29","author":"A Milenkovi\u0107","year":"2006","unstructured":"Milenkovi\u0107, A., Otto, C., & Jovanov, E. (2006). Wireless sensor networks for personal health monitoring: Issues and an implementation. Computer Communications, 29(13), 2521\u20132533","journal-title":"Computer Communications"},{"issue":"2","key":"8545_CR7","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/COMST.2016.2630047","volume":"19","author":"T Huang","year":"2016","unstructured":"Huang, T., Yu, F. R., Zhang, C., Liu, J., Zhang, J., & Liu, Y. (2016). A survey on large-scale software defined networking (SDN) testbeds: Approaches and challenges. IEEE Communications Surveys & Tutorials, 19(2), 891\u2013917","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"10","key":"8545_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54\u201362","journal-title":"Computer"},{"key":"8545_CR9","unstructured":"Kaspersky, DDoS attacks in Q2 2017, 2017, https:\/\/securelist.com\/ddos-attacks-in-q2-2017\/79241\/."},{"key":"8545_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.jnca.2018.03.030","volume":"112","author":"K Singh","year":"2018","unstructured":"Singh, K., Singh, P., & Kumar, K. (2018). User behavior analytics-based classification of application layer HTTP-GET flood attacks. Journal of Network and Computer Applications, 112, 97\u2013114","journal-title":"Journal of Network and Computer Applications"},{"key":"8545_CR11","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ijpe.2015.11.008","volume":"172","author":"S Vadlamani","year":"2016","unstructured":"Vadlamani, S., Eksioglu, B., Medal, H., & Nandi, A. (2016). \u2018Jamming attacks on wireless networks: A taxonomic survey.\u2019 International Journal of Prod. Econ., 172, 76\u201394","journal-title":"International Journal of Prod. Econ."},{"issue":"10","key":"8545_CR12","first-page":"2926","volume":"8","author":"M Premkumar","year":"2019","unstructured":"Premkumar, M., Sundararajan, T. V. P., & Vinoth Kumar, K. (2019). Various defense countermeasures against DoS attacks in wireless sensor networks. International Journal of Scientific and Technology Research, 8(10), 2926\u20132935","journal-title":"International Journal of Scientific and Technology Research"},{"key":"8545_CR13","first-page":"107","volume-title":"Core: a collaborative reputation mechanism to enforce node cooperation in mobile adhoc networks Advanced communications and multimedia security","author":"P Michiardi","year":"2002","unstructured":"Michiardi, P., & Molva, R. (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile adhoc networks Advanced communications and multimedia security. (pp. 107\u2013121). Springer."},{"key":"8545_CR14","unstructured":"Parameswaran, A. T., Husain, M. I., & Upadhyaya, S. (2009). Is rssi a reliable parameter in sensor localization algorithms: An experimental study. In\u00a0Field failure data analysis workshop (F2DA09)\u00a0(Vol. 5). IEEE"},{"issue":"6","key":"8545_CR15","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/35.925685","volume":"39","author":"L Blazevic","year":"2001","unstructured":"Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J. P., & Le Boudec, J. Y. (2001). Self organization in mobile ad hoc networks: the approach of Terminodes. IEEE Communications Magazine, 39(6), 166\u2013174","journal-title":"IEEE Communications Magazine"},{"key":"8545_CR16","doi-asserted-by":"crossref","unstructured":"Premkumar, M., Kathiravan, M., & Thirukkumaran, R. (2012). Efficient Broadcast Authentication using TSG Algorithm for WSN.\u00a0International Journal of Computer Applications,\u00a058(4), 34\u201339.","DOI":"10.5120\/9273-3463"},{"issue":"2","key":"8545_CR17","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1049\/iet-wss.2017.0029","volume":"8","author":"AP Abidoye","year":"2017","unstructured":"Abidoye, A. P., & Obagbuwa, I. C. (2017). DDoS attacks in WSNs: detection and countermeasures. IET Wireless Sensor Systems, 8(2), 52\u201359","journal-title":"IET Wireless Sensor Systems"},{"key":"8545_CR18","doi-asserted-by":"publisher","first-page":"205","DOI":"10.14257\/ijsia.2015.9.5.21","volume":"9","author":"Y Li","year":"2015","unstructured":"Li, Y., Ma, R., & Jiao, R. (2015). A Hybrid Malicious Code Detection Method Based on Deep Learning. Int\u2019l J. Security and Its Applications, 9, 205\u2013216","journal-title":"Int'l J. Security and Its Applications"},{"key":"8545_CR19","unstructured":"Worldwide Infrastructure Security Report (No. XII), 2017."},{"key":"8545_CR20","unstructured":"Camarda, B. (2016) \u201cDdos attacks are soaring, says new report,\u201d TechRep"},{"key":"8545_CR21","doi-asserted-by":"publisher","first-page":"103278","DOI":"10.1016\/j.micpro.2020.103278","volume":"79","author":"M Premkumar","year":"2020","unstructured":"Premkumar, M., & Sundararajan, T. V. P. (2020). DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks. Microprocessors and Microsystems, 79, 103278","journal-title":"Microprocessors and Microsystems"},{"issue":"7553","key":"8545_CR22","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436\u2013444","journal-title":"Nature"},{"key":"8545_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2014.07.019","volume":"51","author":"H Bhuyan","year":"2015","unstructured":"Bhuyan, H., Bhattacharyya, D., & Kalita, J. K. (2015). An empirical evaluation of information metrics for low-rate and high rate ddos attack detection. Pattern Recognition Letters, 51, 1\u20137","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"8545_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-018-0081-z","volume":"2018","author":"S Hameed","year":"2018","unstructured":"Hameed, S., & Ali, U. (2018). HADEC: hadoop-based live DDoS detection framework. EURASIP Journal on Information Security, 2018(1), 1\u201319","journal-title":"EURASIP Journal on Information Security"},{"key":"8545_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2766-4","volume-title":"Deep Learning with Python","author":"N Ketkar","year":"2017","unstructured":"Ketkar, N. (2017). Deep Learning with Python. Apress."},{"key":"8545_CR26","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1016\/j.neucom.2017.09.015","volume":"275","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Zhao, J., & Xiao, Y. (2018). C-RBFNN: A user retweet behavior prediction method for hotspot topics based on improved RBF neural network. Neurocomputing, 275, 733\u2013746","journal-title":"Neurocomputing"},{"issue":"9","key":"8545_CR27","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proceedings of the IEEE, 104(9), 1727\u20131765","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"8545_CR28","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1186\/s13638-016-0623-3","volume":"2016","author":"O Osanaiye","year":"2016","unstructured":"Osanaiye, O., Cai, H., Choo, K.-K.R., Dehghantanha, A., Xu, Z., & Dlodlo, M. (2016). Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016(1), 130","journal-title":"EURASIP Journal on Wireless Communications and Networking"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08545-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08545-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08545-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:01:55Z","timestamp":1634608915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08545-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["8545"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08545-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,3]]},"assertion":[{"value":"22 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict interest"}},{"value":"All data generated or analyzed during this study are included in this published article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Availability of Data and Materials"}}]}}