{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T07:14:04Z","timestamp":1726298044328},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11277-023-10252-3","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T19:02:47Z","timestamp":1678129367000},"page":"2669-2691","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Scalable and Energy Efficient Cluster Based Anomaly Detection Against Denial of Service Attacks in Wireless Sensor Networks"],"prefix":"10.1007","volume":"129","author":[{"given":"M.","family":"Premkumar","sequence":"first","affiliation":[]},{"given":"S. R.","family":"Ashokkumar","sequence":"additional","affiliation":[]},{"given":"V.","family":"Jeevanantham","sequence":"additional","affiliation":[]},{"given":"G.","family":"Mohanbabu","sequence":"additional","affiliation":[]},{"given":"S.","family":"AnuPallavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,6]]},"reference":[{"key":"10252_CR1","doi-asserted-by":"crossref","unstructured":"Amato, F., Mazzocca, N., Moscato, F & Vivenzio, E. (2017). Multilayer perceptron: an intelligent model for classification and intrusion detection. In 31st International Conference on Advanced Information Networking and Applications Workshops, pp. 686\u2013691.","DOI":"10.1109\/WAINA.2017.134"},{"issue":"4","key":"10252_CR2","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1007\/s11277-021-08545-6","volume":"120","author":"M Premkumar","year":"2021","unstructured":"Premkumar, M., & Sundararajan, T. V. P. (2021). Defense countermeasures for DoS attacks in WSNs using deep radial basis networks. Wireless Personal Communications, 120(4), 2545\u20132560.","journal-title":"Wireless Personal Communications"},{"key":"10252_CR3","doi-asserted-by":"crossref","unstructured":"Akyildiz, IF & Vuran, MC. (2010). Wireless sensor networks (Vol. 4)\u2019, John Wiley & Sons.","DOI":"10.1002\/9780470515181"},{"key":"10252_CR4","doi-asserted-by":"crossref","unstructured":"Al Dhaheri, A., Yeun, C. Y., & Damiani, E. (2019, July). New two-level \u00b5TESLA protocol for IoT environments. In\u00a02019 IEEE World Congress on Services (SERVICES)\u00a0(Vol. 2642, pp. 84-91). IEEE.","DOI":"10.1109\/SERVICES.2019.00029"},{"key":"10252_CR5","doi-asserted-by":"crossref","unstructured":"Premkumar, M., Kathiravan, M., & Thirukkumaran, R. (2012). Efficient broadcast authentication using TSG algorithm for WSN. International Journal of Computer Applications, 58(4).","DOI":"10.5120\/9273-3463"},{"key":"10252_CR6","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.cose.2019.01.002","volume":"82","author":"J David","year":"2019","unstructured":"David, J., & Thomas, C. (2019). Efficient DDoS flood attack detection using dynamicthresholding on flow-based network traffic. Computers and Security, 82, 284\u2013295.","journal-title":"Computers and Security"},{"key":"10252_CR7","first-page":"1989","volume":"57","author":"M Premkumar","year":"2022","unstructured":"Premkumar, M., Ashokkumar, S. R., Jeevanantham, V., Pallavi, S. A., Mohanbabu, G., & Raaj, R. S. (2022). Design of cost-effective real time tremor alerting system for patients of neurodegenerative diseases. Materials Today: Proceedings, 57, 1989\u20131994.","journal-title":"Materials Today: Proceedings"},{"key":"10252_CR8","doi-asserted-by":"crossref","unstructured":"Gupta, BB., Dahiya, A., Upneja, C., Garg, A & Choudhary, R. (2020). A comprehensive survey on ddos attacks and recent defense mechanisms. Handbook of Research on Intrusion Detection Systems, pp. 186\u2013218.","DOI":"10.4018\/978-1-7998-2242-4.ch010"},{"issue":"10","key":"10252_CR9","first-page":"2926","volume":"8","author":"M Premkumar","year":"2019","unstructured":"Premkumar, M., Sundararajan, T. V. P., & Kumar, K. V. (2019). Various defense countermeasures against DoS attacks in wireless sensor networks. International Journal of Scientific and Technology Research, 8(10), 2926\u20132935.","journal-title":"International Journal of Scientific and Technology Research"},{"issue":"4","key":"10252_CR10","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1504\/IJCISTUDIES.2020.111044","volume":"9","author":"K Lakshmanarao","year":"2020","unstructured":"Lakshmanarao, K., & Maringanti, H. B. (2020). IbPaKdE: Identity-based pairing free authenticated key and data exchange protocol for wireless sensor networks. International Journal of Computational Intelligence Studies, 9(4), 320\u2013335.","journal-title":"International Journal of Computational Intelligence Studies"},{"issue":"2","key":"10252_CR11","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1002\/ima.22565","volume":"31","author":"SR Ashokkumar","year":"2021","unstructured":"Ashokkumar, S. R., Anupallavi, S., Premkumar, M., & Jeevanantham, V. (2021). Implementation of deep neural networks for classifying electroencephalogram signal using fractional S-transform for epileptic seizure detection. International Journal of Imaging Systems and Technology, 31(2), 895\u2013908.","journal-title":"International Journal of Imaging Systems and Technology"},{"key":"10252_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"2018","unstructured":"Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2018). Handbook of applied cryptography. CRC Press."},{"issue":"1","key":"10252_CR13","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1002\/ima.22670","volume":"32","author":"SR Ashokkumar","year":"2022","unstructured":"Ashokkumar, S. R., Anupallavi, S., MohanBabu, G., Premkumar, M., & Jeevanantham, V. (2022). Emotion identification by dynamic entropy and ensemble learning from electroencephalogram signals. International Journal of Imaging Systems and Technology, 32(1), 402\u2013413.","journal-title":"International Journal of Imaging Systems and Technology"},{"issue":"3","key":"10252_CR14","first-page":"965","volume":"29","author":"M Premkumar","year":"2022","unstructured":"Premkumar, M., Sundararajan, T. V. P., & Mohanbabu, G. (2022). Dynamic defense mechanism for DoS attacks in wireless environments using hybrid intrusion detection system and statistical approaches. Tehni\u010dki vjesnik, 29(3), 965\u2013970.","journal-title":"Tehni\u010dki vjesnik"},{"issue":"1","key":"10252_CR15","doi-asserted-by":"publisher","first-page":"13","DOI":"10.33736\/jita.45.2014","volume":"4","author":"Z Muda","year":"2014","unstructured":"Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2014). K-means clustering and naive bayes classification for intrusion detection. Journal of IT in Asia, 4(1), 13\u201325.","journal-title":"Journal of IT in Asia"},{"key":"10252_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2019.102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 1\u201321.","journal-title":"Journal of Information Security and Applications"},{"key":"10252_CR17","doi-asserted-by":"crossref","unstructured":"Pump, R., Ahlers, V & Koschel, A. (2020). Evaluating artificial immune system algorithms for intrusion detection. Fourth World Conference on Smart Trends in Systems, Security and Sustainability, pp. 92\u201397.","DOI":"10.1109\/WorldS450073.2020.9210342"},{"key":"10252_CR18","doi-asserted-by":"crossref","unstructured":"Ramanujan, A & Varghese, BA. (2021). A survey on DDoS prevention, detection, and traceback in cloud. In Second International Conference on Networks and Advances in Computational Technologies, pp. 69\u201382.","DOI":"10.1007\/978-3-030-49500-8_7"},{"key":"10252_CR19","doi-asserted-by":"crossref","unstructured":"Rehman, SU & Manickam, S. (2015). Rule-based mechanism to detect denial of service (DoS) attacks on duplicate address detection process in IPv6 link local communication. International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), pp. 1\u20136.","DOI":"10.1109\/ICRITO.2015.7359243"},{"key":"10252_CR20","doi-asserted-by":"crossref","unstructured":"Striegel, M., Heyszl, J., Jakobsmeier, F., Matveev, Y & Sigl, G. (2020). Secure and user-friendly over-the-air firmware distribution in a portable faraday cage. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 173\u2013183.","DOI":"10.1145\/3395351.3399342"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10252-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10252-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10252-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T07:08:26Z","timestamp":1680678506000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10252-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,6]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10252"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10252-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1762022\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,6]]},"assertion":[{"value":"20 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}