{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:07:17Z","timestamp":1753880837145,"version":"3.41.2"},"reference-count":32,"publisher":"World Scientific Pub Co Pte Ltd","issue":"18","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:p> Cyber-physical system is one of the essential components of wireless sensor network (WSN). WSN conjointly senses, collects, analyzes and communicates data on recognized items at service part before transmitting this data to the owner of the network. Blackhole, Grayhole, Flooding, Scheduling are the common WSN attacks that rapidly damage the system. Intrusion detection systems, such as WSN have drawbacks, like less detection rates, high computation costs and high percentage of false alarms, because sensor nodes have limited resources. Therefore, a Self Attention Generative Adversarial Capsule Network as an intrusion detection scheme for WSN (SAGACN-ID-WSN) is proposed in this paper to address the aforementioned issues. Initially, the data are amassed from WSN-DS dataset. Then, the data are sent for pre-processing. The input data are preprocessed using the Guided Box Filtering (GBF) method. Then, the preprocessed data are provided to the Atomic Orbital Search (AOS), Tasmanian Devil Optimization (TDO) and Ebola Optimization Search (EOS) algorithms for feature selection. The attacks are divided into four categories: normal, Grayhole attack, Black hole attack, flooding attack, and scheduling attack. The proposed ID-WSN is implemented in Network simulator 2 (NS-2) utilizing the dataset of WSN-DS. The metrics, like accuracy, precision, recall, F-measure, ROC and computational time are analyzed. The proposed SAGACN-ID-WSN technique attains 25.5%, 20.12% and 20.7% high accuracy, 51.136%, 59.04% and 32.81%; higher precision, 2.292%, 1.51% and 3.915% lower error rate compared to the existing models, like Dataset for Intrusion Detection Systems in WSN (SLGBM-ID-WSN), multi-layer machine learning-based ID-WSN (NB-RF-ID-WSN), deep learning and entity embedding-base intrusion detection systems in WSN, respectively. <\/jats:p>","DOI":"10.1142\/s0218126625500173","type":"journal-article","created":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T03:45:57Z","timestamp":1723347957000},"source":"Crossref","is-referenced-by-count":0,"title":["An Intrusion Detection Mechanism for Wireless Sensor Networks in Smart Environments using Self Attention Generative Adversarial Capsule Network"],"prefix":"10.1142","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2123-5023","authenticated-orcid":false,"given":"T. Senthil","family":"Kumaran","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, ACS College of Engineering, Bengaluru, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6952-1443","authenticated-orcid":false,"given":"A.","family":"Muruganandham","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Rajarajeswari College of Engineering, Bengaluru, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3105-4725","authenticated-orcid":false,"given":"D.","family":"Sobya","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Institute of Engineering and Management, University of Engineering and Management, Kolkata 7000091, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6371-2302","authenticated-orcid":false,"given":"Mahantesh","family":"Mathapati","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Amruta Institute of Engineering and Management Sciences, Bengaluru, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"219","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"S0218126625500173BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02228-z"},{"key":"S0218126625500173BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02866-x"},{"key":"S0218126625500173BIB003","doi-asserted-by":"publisher","DOI":"10.2174\/2213275912666181207154754"},{"key":"S0218126625500173BIB004","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.018518"},{"key":"S0218126625500173BIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122987"},{"key":"S0218126625500173BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09521-4"},{"key":"S0218126625500173BIB007","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v21.i1.pp516-523"},{"key":"S0218126625500173BIB008","first-page":"1","author":"Zhang T.","year":"2021","journal-title":"Wireless Person. Commun."},{"key":"S0218126625500173BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024219"},{"key":"S0218126625500173BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3114270"},{"key":"S0218126625500173BIB011","first-page":"2088","volume":"11","author":"Hasan B.","year":"2021","journal-title":"Int. J. Electric. Comput. Eng."},{"key":"S0218126625500173BIB012","first-page":"106","volume":"14","author":"Srividya P.","year":"2021","journal-title":"Int. J. Intel. Eng. Syst."},{"key":"S0218126625500173BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3077946"},{"key":"S0218126625500173BIB015","doi-asserted-by":"publisher","DOI":"10.1177\/15501477211068389"},{"key":"S0218126625500173BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/CAPS52117.2021.9730647"},{"key":"S0218126625500173BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3063538"},{"key":"S0218126625500173BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.06.024"},{"key":"S0218126625500173BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/TPEC54980.2022.9750751"},{"key":"S0218126625500173BIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2023.102260"},{"key":"S0218126625500173BIB022","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4731953"},{"key":"S0218126625500173BIB023","first-page":"281","volume":"12","author":"Alruhaily N. M.","year":"2021","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"S0218126625500173BIB024","first-page":"1343","volume":"69","author":"Almaslukh B.","year":"2021","journal-title":"CMC Comput. Mater. Contin."},{"key":"S0218126625500173BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09776-x"},{"key":"S0218126625500173BIB026","first-page":"1","volume":"2021","author":"Pan J. S.","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"S0218126625500173BIB027","first-page":"1","volume":"26","author":"Gowdhaman V.","year":"2021","journal-title":"Soft Comput."},{"key":"S0218126625500173BIB028","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418355"},{"key":"S0218126625500173BIB029","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9089370"},{"key":"S0218126625500173BIB031","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114884"},{"key":"S0218126625500173BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3147821"},{"key":"S0218126625500173BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3096726"},{"key":"S0218126625500173BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151641"},{"key":"S0218126625500173BIB035","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.10.092"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126625500173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T03:22:03Z","timestamp":1735010523000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218126625500173"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"references-count":32,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["10.1142\/S0218126625500173"],"URL":"https:\/\/doi.org\/10.1142\/s0218126625500173","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2024,11,13]]},"article-number":"2550017"}}