{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:35:46Z","timestamp":1775579746612,"version":"3.50.1"},"reference-count":39,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.054966","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T02:54:52Z","timestamp":1726109692000},"page":"471-501","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":7,"title":["A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection"],"prefix":"10.32604","volume":"81","author":[{"given":"Chandraumakantham Om","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sudhakaran","family":"Gajendran","sequence":"additional","affiliation":[]},{"given":"Suguna","family":"Marappan","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Zakariah","sequence":"additional","affiliation":[]},{"given":"Abdulaziz S.","family":"Almazyad","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.gltp.2022.04.022","article-title":"Trust based anonymous intrusion detection for cloud assisted WSN-IOT","volume":"3","author":"Rajan","year":"2022","journal-title":"Global Trans. Proc."},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.3390\/app12105015","article-title":"IoT intrusion detection using machine learning with a novel high performing feature selection method","volume":"12","author":"Albulayhi","year":"2022","journal-title":"Appl. Sci."},{"key":"ref3","first-page":"216","article-title":"Comparative analysis of security issues and trends in IoT and WSN","volume":"14","author":"Choudhary","year":"2022","journal-title":"SAMRIDDHI: J. Phys. Sci., Eng. Tech."},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.673","article-title":"A survey of Sybil attack countermeasures in IoT-based wireless sensor networks","volume":"7","author":"Arshad","year":"2021","journal-title":"PeerJ. Comput. Sci."},{"key":"ref5","first-page":"239","article-title":"An energy aware routing to optimize route selection in cluster based wireless sensor-IoT network (EACW)","volume":"6","author":"Anand","year":"2022","journal-title":"Int. J. Trend Sci. Res. Develop."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"3365","DOI":"10.1007\/s11277-021-08881-7","article-title":"A new approach of WSN deployment, K-coverage and connectivity in border area","volume":"121","author":"Zrelli","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref7","first-page":"651","article-title":"Data aggregation protocols for WSN and IoT applications-A comprehensive survey","volume":"35","author":"Begum","year":"2023","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref8","first-page":"6012","article-title":"Trust establishment for detecting aggressor nodes and improving route stability in WSN-IoT","volume":"12","author":"Sasirega","year":"2021","journal-title":"Turk. J. Comput. Math. Educ."},{"key":"ref9","first-page":"2558","article-title":"A metaheuristic optimization approach for energy efficiency in the IoT networks","volume":"51","author":"Iwendi","year":"2021","journal-title":"Softw.: Pract. Exp."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"121173","DOI":"10.1109\/ACCESS.2022.3220622","article-title":"Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey","volume":"10","author":"Jayalaxmi","year":"2022","journal-title":"IEEE Access"},{"key":"ref11","series-title":"2022 Int. Conf. Comput. Commun. Inf. (ICCCI)","article-title":"A comparative study of diverse intrusion detection methods using machine learning techniques","author":"Kathiresan","year":"2022"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1109\/TII.2022.3164770","article-title":"Dependable intrusion detection system for IoT: A deep transfer learning based approach","volume":"19","author":"Mehedi","year":"Jan. 2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"64375","DOI":"10.1109\/ACCESS.2022.3182333","article-title":"RTIDS: A robust transformer-based approach for intrusion detection system","volume":"10","author":"Wu","year":"2022","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09621-9","article-title":"Deep learning in IoT intrusion detection","volume":"30","author":"Tsimenidis","year":"2022","journal-title":"J. Netw. Syst. Manag."},{"key":"ref15","article-title":"Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review","volume":"220","author":"Hamza","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"156171","DOI":"10.1109\/ACCESS.2021.3126537","article-title":"An improved sunflower optimization algorithm for cluster head selection in the Internet of Things","volume":"9","author":"Raslan","year":"2021","journal-title":"IEEE Access"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.gltp.2022.03.018","article-title":"An optimal cluster & trusted path for routing formation and classification of intrusion using the machine learning classification approach in WSN","volume":"3","author":"Srividya","year":"2022","journal-title":"Global Trans. Proc."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"12361","DOI":"10.1007\/s00500-020-04678-1","article-title":"Wireless sensor network intrusion detection system based on MK-ELM","volume":"24","author":"Zhang","year":"2020","journal-title":"Soft Comput."},{"key":"ref19","first-page":"285","article-title":"An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs)","volume":"10","author":"Hemanand","year":"2022","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","article-title":"CNN-LSTM: Hybrid deep neural network for network intrusion detection system","volume":"10","author":"Halbouni","year":"2022","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"92931","DOI":"10.1109\/ACCESS.2022.3202807","article-title":"STLGBM-DDS: An efficient data balanced DoS detection system for wireless sensor networks on big data environment","volume":"10","author":"Dener","year":"2022","journal-title":"IEEE Access"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3521","DOI":"10.1007\/s10586-023-04157-w","article-title":"IDS-XGbFS: A smart intrusion detection system using XGboostwith recent feature selection for VANET safety","volume":"27","author":"Amaouche","journal-title":"Cluster Comput."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s11416-022-00456-9","article-title":"An effective intrusion detection approach based on ensemble learning for IIoT edge computing","volume":"19","author":"Mohy-Eddine","year":"2023","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"23615","DOI":"10.1007\/s11042-023-14795-2","article-title":"An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection","volume":"82","author":"Mohy-eddine","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"7488","DOI":"10.3390\/app13137488","article-title":"FSCB-IDS: Feature selection and minority class balancing for attacks detection in VANETS","volume":"13","author":"Amaouche","year":"2023","journal-title":"Appl. Sci."},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1016\/j.micpro.2023.104966","article-title":"An intrusion detection model using election-based feature selection and K-NN","author":"Mohy-Eddine","year":"2023","journal-title":"Microprocess. Microsyst."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","article-title":"An ensemble learning based intrusion detection model for industrial IoT security","volume":"6","author":"Mohy-Eddine","year":"2023","journal-title":"Big Data Min. Anal."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"9136","DOI":"10.1109\/ACCESS.2023.3238664","article-title":"Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures","volume":"11","author":"Kandhro","year":"2023","journal-title":"IEEE Access"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1109\/ACCESS.2022.3233775","article-title":"Transfer learning approach to IDS on cloud IoT devices using optimized CNN","volume":"11","author":"Okey","year":"2023","journal-title":"IEEE Access"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1747","DOI":"10.1109\/TII.2022.3204034","article-title":"A regularized cross-layer ladder network for intrusion detection in industrial Internet of Things","volume":"19","author":"Long","year":"Feb. 2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.future.2020.07.042","article-title":"Genetic convolutional neural network for intrusion detection systems","volume":"113","author":"T. Nguyen","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref32","article-title":"NSL-KDD","author":"Zhao","year":"Feb. 2, 2022","journal-title":"IEEE Dataport"},{"key":"ref33","series-title":"Proc. 16th Eur. Conf. Cyber Warfare Secur.","first-page":"361","article-title":"Flow-based benchmark data sets for intrusion detection","author":"Ring","year":"2017"},{"key":"ref34","series-title":"2015 Mil. Commun. Inf. Syst. Conf. (MilCIS)","article-title":"UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015"},{"key":"ref35","series-title":"4th Int. Conf. Inf. Syst. Secur. Privacy (ICISSP)","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin","year":"Jan. 2018"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","article-title":"Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEE Access"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"100","DOI":"10.29121\/granthaalayah.v3.i12.2015.2894","article-title":"GAFS: Genetic algorithm-based filtering scheme for improving detection power in sensor networks","volume":"3","author":"Cho","year":"2015","journal-title":"Int. J. Res.-Granthaalayah"},{"key":"ref39","unstructured":"D. Powers, \u201cEvaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation,\u201d 2020, arXiv:2010.16061."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_54966\/TSP_CMC_54966.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:36:14Z","timestamp":1741314974000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.054966","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-31","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}