Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks.
Rajasoundaran SoundararajanSripathi Venkata Naga Santhosh KumarMunuswamy SelviK. ThangaramyaKannan ArputharajPublished in: Wirel. Networks (2024)
Keyphrases
- detection scheme
- wireless sensor networks
- sensor networks
- key management
- key establishment
- key management scheme
- energy efficient
- resource constrained
- intrusion detection
- underwater acoustic
- sensor nodes
- energy consumption
- intrusion detection system
- routing algorithm
- secure routing
- environmental monitoring
- recurrent neural networks
- energy efficiency
- base station
- data aggregation
- network security
- security mechanisms
- wireless communication
- wireless sensor
- biological inspired
- security analysis
- sensor data
- mac protocol
- security issues
- anomaly detection
- routing protocol
- cryptographic protocols
- multi hop
- security measures
- topology control
- key distribution
- quality of service
- security requirements