Malicious attack detection based on continuous Hidden Markov Models in Wireless sensor networks.
Anselme Russel Affane MoundoungaHassan SatoriYousssef BoutazartEzzine AbderrahimPublished in: Microprocess. Microsystems (2023)
Keyphrases
- attack detection
- wireless sensor networks
- continuous hidden markov models
- hidden markov models
- multistage
- intrusion detection system
- malicious nodes
- sensor networks
- energy consumption
- resource constrained
- sensor nodes
- data collection
- image sequences
- routing protocol
- cyber attacks
- wireless communication
- lightweight
- product recommendation
- attack scenarios
- sufficient conditions