Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Arulselvan, G.a; * | Rajaram, A.b; 1
Affiliations: [a] Department of Computer Science and Engineering, E.G.S. Pillay Engineering College, Nagapattinam, Tamilnadu, India | [b] Department of Electronics and Communication Engineering, E.G.S. Pillay Engineering College, Nagapattinam, Tamilnadu, India
Correspondence: [*] Corresponding author. G. Arulselvan, Research Scholar, Department of Computer Science and Engineering, E.G.S. Pillay Engineering College, 611002, Nagapattinam, Tamilnadu, India. E-mail: selvamarul737@gmail.com.
Note: [1] E-mail: drrajaram@egspec.org.
Abstract: Maintaining a healthy environment requires constant vigilance. Keeping constant tabs on environmental factors might be a useful tool in the fight against and recovery from environmental degradation. It is possible to send environmental data from strategically positioned sensors that monitor the surrounding circumstances. Environmentalists are the first to arrive at a disaster site, assess the situation, and take corrective measures. To get information from the sensors, they must coordinate with one another. Remote environmental sensing, the tracking from several physical systems, as well as risk assessment and management, have all seen significant improvements as a result of the use of these networks, which are comprised of many dispersed devices, each of which includes sensing, processing, and wireless technology capabilities. To facilitate communication between sensors and ecologists, the authors of this research suggest the usage of MANETs. To address these issues, a hybrid trust-based secure routing protocol is designed. Firstly, nodes are clustered using the Skill Optimization Technique. The Direct and Indirect (Hybrid) trust is computed using the Deep Q-Learning technique and then Routing is established using Diffusion Convolutional Neural Networks. With these methods, routing attacks such as Black Hole, Gray hole, and Wormhole attacks are identified and compared with the traditional security protocols using network simulation tools.
Keywords: Environmental monitoring, hybrid trust, deep Q learning, attacks detection, and mitigation and cluster-based routing
DOI: 10.3233/JIFS-231905
Journal: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 4, pp. 6575-6590, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl