{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:23:09Z","timestamp":1717201389725},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11277-024-10999-3","type":"journal-article","created":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T10:09:36Z","timestamp":1715940576000},"page":"1965-1992","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models"],"prefix":"10.1007","volume":"135","author":[{"given":"Anselme R.","family":"Affane\u00a0M.","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7393-5726","authenticated-orcid":false,"given":"Hassan","family":"Satori","sequence":"additional","affiliation":[]},{"given":"Youssef","family":"Boutazart","sequence":"additional","affiliation":[]},{"given":"Abderahim","family":"Ezzine","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Satori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,17]]},"reference":[{"key":"10999_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470666388","volume-title":"Fundamentals of wireless sensor networks: Theory and practice","author":"W Dargie","year":"2010","unstructured":"Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks: Theory and practice. John Wiley & Sons."},{"key":"10999_CR2","doi-asserted-by":"crossref","unstructured":"Winkler, M., Tuchs, K.-D., Hughes, K., & Barclay, G. (2008). Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications and Information Technology, pages 37\u201345.","DOI":"10.26636\/jtit.2008.2.870"},{"key":"10999_CR3","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.comnet.2015.03.002","volume":"83","author":"A Nadeem","year":"2015","unstructured":"Nadeem, A., Hussain, M. A., Owais, O., Salam, A., Iqbal, S., & Ahsan, K. (2015). Application specific study, analysis and classification of body area wireless sensor network applications. Computer Networks, 83, 363\u2013380.","journal-title":"Computer Networks"},{"key":"10999_CR4","doi-asserted-by":"crossref","unstructured":"Moundounga, A., Russel, A., Hassan, S. & Satori, K. (2020). An overview of routing techniques in wsns. In 2020 Fourth international conference on intelligent computing in data sciences (ICDS), pages 1\u20137. IEEE.","DOI":"10.1109\/ICDS50568.2020.9268764"},{"key":"10999_CR5","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.comnet.2018.07.016","volume":"143","author":"M Khiati","year":"2018","unstructured":"Khiati, M., & Djenouri, D. (2018). Adaptive learning-enforced broadcast policy for solar energy harvesting wireless sensor networks. Computer Networks, 143, 263\u2013274.","journal-title":"Computer Networks"},{"key":"10999_CR6","doi-asserted-by":"crossref","unstructured":"Meesookho, C., Narayanan, S., & Raghavendra, C.S. (2002). Collaborative classification applications in sensor networks. In Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002, pages 370\u2013374. IEEE.","DOI":"10.1109\/SAM.2002.1191063"},{"key":"10999_CR7","doi-asserted-by":"crossref","unstructured":"Bao, F., Chen, R., Chang, M. J., & Cho, J.-H. (2011). Trust-based intrusion detection in wireless sensor networks. In 2011 IEEE international conference on communications (ICC), pages 1\u20136. IEEE.","DOI":"10.1109\/icc.2011.5963250"},{"issue":"2","key":"10999_CR8","doi-asserted-by":"publisher","first-page":"411","DOI":"10.3390\/s22020411","volume":"22","author":"S Awan","year":"2022","unstructured":"Awan, S., Javaid, N., Ullah, S., Khan, A. U., Qamar, A. M., & Choi, J.-G. (2022). Blockchain based secure routing and trust management in wireless sensor networks. Sensors, 22(2), 411.","journal-title":"Sensors"},{"key":"10999_CR9","doi-asserted-by":"crossref","unstructured":"Salmi, S., & Oughdir, L. (2022). Cnn-lstm based approach for dos attacks detection in wireless sensor networks. International Journal of Advanced Computer Science and Applications, 13(4).","DOI":"10.14569\/IJACSA.2022.0130497"},{"key":"10999_CR10","doi-asserted-by":"crossref","unstructured":"Ismail, S., & Reza, H. (2022). Evaluation of na\u00efve bayesian algorithms for cyber-attacks detection in wireless sensor networks. In 2022 IEEE world AI IoT congress (AIIoT), pages 283\u2013289. IEEE.","DOI":"10.1109\/AIIoT54504.2022.9817298"},{"issue":"15","key":"10999_CR11","doi-asserted-by":"publisher","first-page":"2324","DOI":"10.3390\/electronics11152324","volume":"11","author":"M Hanif","year":"2022","unstructured":"Hanif, M., Ashraf, H., Jalil, Z., Jhanjhi, N. Z., Humayun, M., Saeed, S., & Almuhaideb, A. M. (2022). Ai-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324.","journal-title":"Electronics"},{"key":"10999_CR12","doi-asserted-by":"publisher","first-page":"184133","DOI":"10.1109\/ACCESS.2019.2960609","volume":"7","author":"T-H Kim","year":"2019","unstructured":"Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133\u2013184144.","journal-title":"IEEE Access"},{"issue":"4","key":"10999_CR13","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/JSAC.2005.843539","volume":"23","author":"JH Kotecha","year":"2005","unstructured":"Kotecha, J. H., Ramachandran, V., & Sayeed, A. M. (2005). Distributed multitarget classification in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 703\u2013713.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10999_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"Shailendra Rathore and Jong Hyuk Park","year":"2018","unstructured":"Shailendra Rathore and Jong Hyuk Park. (2018). Semi-supervised learning based distributed attack detection framework for iot. Applied Soft Computing, 72, 79\u201389.","journal-title":"Applied Soft Computing"},{"key":"10999_CR15","doi-asserted-by":"crossref","unstructured":"Aljaafreh, A., & Dong, L. (2010). Ground vehicle classification based on hierarchical hidden markov model and gaussian mixture model using wireless sensor networks. In 2010 IEEE international conference on electro\/information technology, pages 1\u20134. IEEE.","DOI":"10.1109\/EIT.2010.5612181"},{"issue":"5","key":"10999_CR16","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/LCOMM.2015.2413407","volume":"19","author":"PS Rossi","year":"2015","unstructured":"Rossi, P. S., Ciuonzo, D., & Ekman, T. (2015). Hmm-based decision fusion in wireless sensor networks with noncoherent multiple access. IEEE Communications Letters, 19(5), 871\u2013874.","journal-title":"IEEE Communications Letters"},{"key":"10999_CR17","doi-asserted-by":"crossref","unstructured":"Sundar, C., Chitradevi, M., & Geetharamani, G. (2012). Classification of cardiotocogram data using neural network based machine learning technique. International Journal of Computer Applications, 47(14).","DOI":"10.5120\/7256-0279"},{"key":"10999_CR18","doi-asserted-by":"publisher","DOI":"10.1201\/9780429261046","volume-title":"Hidden Markov models: Theory and implementation using MATLAB\u00ae","author":"JP Coelho","year":"2019","unstructured":"Coelho, J. P., Pinho, T. M., & Boaventura-Cunha, J. (2019). Hidden Markov models: Theory and implementation using MATLAB\u00ae. CRC Press."},{"key":"10999_CR19","doi-asserted-by":"crossref","unstructured":"Almomani, I., Al-Kasasbeh, B., & Al-Akhras, M. (2016). Wsn-ds: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016.","DOI":"10.1155\/2016\/4731953"},{"key":"10999_CR20","unstructured":"Park, T., Cho, D., Kim, H., et\u00a0al. (2018). An effective classification for dos attacks in wireless sensor networks. In 2018 Tenth international conference on ubiquitous and future networks (ICUFN), pages 689\u2013692. IEEE."},{"issue":"5","key":"10999_CR21","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1109\/TSP.2006.871973","volume":"54","author":"C Budianu","year":"2006","unstructured":"Budianu, C., Ben-David, S., & Tong, L. (2006). Estimation of the number of operating sensors in large-scale sensor networks with mobile access. IEEE Transactions on Signal Processing, 54(5), 1703\u20131715.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10999_CR22","unstructured":"Wang, Q., Hassanein, H., & Takahara, G. (2004). Stochastic modeling of distributed, dynamic, randomized clustering protocols for wireless sensor networks. In Workshops on mobile and wireless networking\/high performance scientific, engineering computing\/network design and architecture\/optical networks control and management\/Ad hoc and sensor networks\/Compil, pages 456\u2013463. IEEE."},{"issue":"10","key":"10999_CR23","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.comcom.2004.01.004","volume":"27","author":"RAF Mini","year":"2004","unstructured":"Mini, R. A. F., Loureiro, A. A. F., & Nath, B. (2004). The distinctive design characteristic of a wireless sensor network: the energy map. Computer Communications, 27(10), 935\u2013945.","journal-title":"Computer Communications"},{"key":"10999_CR24","doi-asserted-by":"crossref","unstructured":"Gupta, P, & Kumar, P.\u00a0R. (1999). Critical power for asymptotic connectivity in wireless networks. In Stochastic analysis, control, optimization and applications, pages 547\u2013566. Springer.","DOI":"10.1007\/978-1-4612-1784-8_33"},{"key":"10999_CR25","unstructured":"Huang, X., Acero, A., & Hon, H.-W. (2001). and Raj Reddy. Spoken language processing: A guide to theory, algorithm, and system development. Prentice hall PTR."},{"key":"10999_CR26","doi-asserted-by":"crossref","unstructured":"Hu, P., Zhou, Z., Liu, Q., & Li, F. (2007). The hmm-based modeling for the energy level prediction in wireless sensor networks. In 2007 2nd IEEE conference on industrial electronics and applications, pages 2253\u20132258. IEEE.","DOI":"10.1109\/ICIEA.2007.4318812"},{"key":"10999_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102164","volume":"103","author":"Nazli Tekin and Vehbi Cagri Gungor","year":"2020","unstructured":"Nazli Tekin and Vehbi Cagri Gungor. (2020). Analysis of compressive sensing and energy harvesting for wireless multimedia sensor networks. Ad Hoc Networks, 103, 102164.","journal-title":"Ad Hoc Networks"},{"issue":"6","key":"10999_CR28","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.1177\/0142331217691334","volume":"40","author":"M Saihi","year":"2018","unstructured":"Saihi, M., Zouinkhi, A., Boussaid, B., Abdelkarim, M. N., & Andrieux, G. (2018). Hidden gaussian markov model for distributed fault detection in wireless sensor networks. Transactions of the Institute of Measurement and Control, 40(6), 1788\u20131798.","journal-title":"Transactions of the Institute of Measurement and Control"},{"issue":"7","key":"10999_CR29","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s00779-009-0225-8","volume":"13","author":"Y Kim","year":"2009","unstructured":"Kim, Y., Jeong, S., Kim, D., & L\u00f3pez, T. S. (2009). An efficient scheme of target classification and information fusion in wireless sensor networks. Personal and Ubiquitous Computing, 13(7), 499\u2013508.","journal-title":"Personal and Ubiquitous Computing"},{"key":"10999_CR30","doi-asserted-by":"crossref","unstructured":"Dymarski, P. (2011). Hidden Markov models: Theory and applications. BoD\u2013Books on Demand.","DOI":"10.5772\/601"},{"issue":"3","key":"10999_CR31","doi-asserted-by":"publisher","first-page":"745","DOI":"10.3390\/s20030745","volume":"20","author":"M Emperuman","year":"2020","unstructured":"Emperuman, M., & Chandrasekaran, S. (2020). Hybrid continuous density hmm-based ensemble neural networks for sensor fault detection and classification in wireless sensor network. Sensors, 20(3), 745.","journal-title":"Sensors"},{"issue":"14","key":"10999_CR32","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.1016\/j.comnet.2009.05.007","volume":"53","author":"CT Calafate","year":"2009","unstructured":"Calafate, C. T., Manzoni, P., Cano, J.-C., & Malumbres, M. P. (2009). Markovian-based traffic modeling for mobile ad hoc networks. Computer Networks, 53(14), 2586\u20132600.","journal-title":"Computer Networks"},{"key":"10999_CR33","doi-asserted-by":"crossref","unstructured":"Ghadban, N., Honeine, P., Francis, C., Mourad-Chehade, F., & Farah, J. (2014). Strategies for principal component analysis in wireless sensor networks. In 2014 IEEE 8th sensor array and multichannel signal processing workshop (SAM), pages 233\u2013236.","DOI":"10.1109\/SAM.2014.6882383"},{"key":"10999_CR34","unstructured":"Kassambara, A. (2017). Practical guide to principal component methods in R. Sthda."},{"key":"10999_CR35","doi-asserted-by":"crossref","unstructured":"Issariyakul, T., & Hossain, E. (2009). Introduction to network simulator 2 (ns2). In Introduction to network simulator NS2, pages 1\u201318. Springer.","DOI":"10.1007\/978-0-387-71760-9_2"},{"issue":"1\u20132","key":"10999_CR36","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1504\/IJAHUC.2015.067756","volume":"18","author":"MA Rassam","year":"2015","unstructured":"Rassam, M. A., Zainal, A., & Maarof, M. A. (2015). Principal component analysis-based data reduction model for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 18(1\u20132), 85\u2013101.","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-10999-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-10999-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-10999-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T09:36:41Z","timestamp":1717148201000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-10999-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["10999"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-10999-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"20 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}