98%
921
2 minutes
20
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge computing. An intrusion detection system (IDS), as a proactive network security protection technology, provides an effective defense system for the WSN. In this paper, we propose a WSN intelligent intrusion detection model, through the introduction of the k-Nearest Neighbor algorithm (kNN) in machine learning and the introduction of the arithmetic optimization algorithm (AOA) in evolutionary calculation, to form an edge intelligence framework that specifically performs the intrusion detection when the WSN encounters a DoS attack. In order to enhance the accuracy of the model, we use a parallel strategy to enhance the communication between the populations and use the Lévy flight strategy to adjust the optimization. The proposed PL-AOA algorithm performs well in the benchmark function test and effectively guarantees the improvement of the kNN classifier. We use Matlab2018b to conduct simulation experiments based on the WSN-DS data set and our model achieves 99% ACC, with a nearly 10% improvement compared with the original kNN when performing DoS intrusion detection. The experimental results show that the proposed intrusion detection model has good effects and practical application significance.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8963005 | PMC |
http://dx.doi.org/10.3390/s22041407 | DOI Listing |
This paper presents a novel multiscale signal processing framework for power quality disturbance (PQD) and cyber intrusion detection in smart grids, combining Non-Subsampled Contourlet Transform (NSCT), Split Augmented Lagrangian Shrinkage Algorithm (SALSA), and Morphological Component Analysis (MCA). A key innovation lies in an adaptive weighting mechanism within NSCT's directional sub bands, enabling dynamic energy redistribution and enhanced representation of both low-frequency anomalies (e.g.
View Article and Find Full Text PDFPLoS One
September 2025
School of Electronics Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India.
Computer networks are highly vulnerable to cybersecurity intrusions. Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. To protect the network security against attacks, various security protocols, including authorization, the authentication process, and intrusion detection techniques, are essential.
View Article and Find Full Text PDFActa Neuropsychiatr
September 2025
Goethe-University Frankfurt am Main; Department of Psychiatry, Psychosomatic Medicine and Psychotherapy, University Hospital, Frankfurt, Germany.
Objective: Cortisol is a well-established biomarker of stress, assessed through salivary or blood samples, which are intrusive and time-consuming. Speech, influenced by physiological stress responses, offers a promising non-invasive, real-time alternative for stress detection. This study examined relationships between speech features, state anger, and salivary cortisol using a validated stress-induction paradigm.
View Article and Find Full Text PDFPLoS One
September 2025
College of Engineering and Technology, American University of the Middle East, Kuwait.
This paper presents a hybrid adaptive approach based on machine learning (ML) for classifying incoming traffic, feature selection and thresholding, aimed at enhancing downgrade attack detection in Wi-Fi Protected Access 3 (WPA3) networks. The fast proliferation of WPA3 is regarded critical for securing modern Wi-Fi systems, which have become integral to 5G and Beyond (5G&B) Radio Access Networks (RAN) architecture. However, the wireless communication channel remains inherently susceptible to downgrade attacks, where adversaries intentionally cause networks to revert from WPA3 to WPA2, with the malicious intent of exploiting known security flaws.
View Article and Find Full Text PDFSci Rep
August 2025
Department of clinical Laboratory Sciences, College of Applied Medical Sciences, King Khalid University, 61421, Abha, Saudi Arabia.
The exponential growth of digital technologies has brought about a surge in the complexity and frequency of cyber-attacks, necessitating robust cyber security measures. This study introduces an innovative approach to cyber security data analysis by leveraging Convolutional Neural Network (CNN) technology. The primary objective is to explore the potential of CNNs in accurately and efficiently detecting and classifying cyber security threats.
View Article and Find Full Text PDF