{"id":"https://openalex.org/W7128545932","doi":"https://doi.org/10.1002/dac.70397","title":"Wireless Sensor Networks Security Using SACCGAN\u2010RSA in a Novel Deep Learning\u2013Based Intrusion Detection Framework for Enhancing","display_name":"Wireless Sensor Networks Security Using SACCGAN\u2010RSA in a Novel Deep Learning\u2013Based Intrusion Detection Framework for Enhancing","publication_year":2026,"publication_date":"2026-02-10","ids":{"openalex":"https://openalex.org/W7128545932","doi":"https://doi.org/10.1002/dac.70397"},"language":"en","primary_location":{"id":"doi:10.1002/dac.70397","is_oa":false,"landing_page_url":"https://doi.org/10.1002/dac.70397","pdf_url":null,"source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125493752","display_name":"S.\u00a0K. Muthusundar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210151956","display_name":"Robert Bosch (India)","ror":"https://ror.org/04my8ty22","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210151956","https://openalex.org/I889804353"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S.\u00a0K. Muthusundar","raw_affiliation_strings":["Department of Artificial Intelligence and Data Science Chennai Institute of Technology  Chennai India"],"affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Science Chennai Institute of Technology  Chennai India","institution_ids":["https://openalex.org/I4210151956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125561332","display_name":"Nallusamy R","orcid":null},"institutions":[{"id":"https://openalex.org/I4210115326","display_name":"Swami Vivekanand College of Pharmacy","ror":"https://ror.org/029n4n358","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210115326"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nallusamy R","raw_affiliation_strings":["Department of Information Technology Muthayammal Engineering College, Rasipuram  Namakkal Tamil Nadu India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology Muthayammal Engineering College, Rasipuram  Namakkal Tamil Nadu India","institution_ids":["https://openalex.org/I4210115326"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083823583","display_name":"S. Jayalekshmi a","orcid":null},"institutions":[{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shri\u00a0Vindhya A","raw_affiliation_strings":["Department of Computer Science and Engineering, Saveetha School of Engineering, SIMATS Engineering Saveetha Institute of Medical and Technical Sciences (SIMATS), Thandalam  Chennai India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Saveetha School of Engineering, SIMATS Engineering Saveetha Institute of Medical and Technical Sciences (SIMATS), Thandalam  Chennai India","institution_ids":["https://openalex.org/I85461943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125579612","display_name":"Vignesh T","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164786","display_name":"Optimal Solutions (United States)","ror":"https://ror.org/05t1cnz26","country_code":"US","type":"company","lineage":["https://openalex.org/I4210164786"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vignesh T","raw_affiliation_strings":["Department of Computer Science and Business Systems Panimalar Engineering College  Chennai Tamil Nadu India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Business Systems Panimalar Engineering College  Chennai Tamil Nadu India","institution_ids":["https://openalex.org/I4210164786"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5125493752"],"corresponding_institution_ids":["https://openalex.org/I4210151956"],"apc_list":{"value":3450,"currency":"USD","value_usd":3450},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.6947328,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"39","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.13899999856948853,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.13899999856948853,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.10769999772310257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.06109999865293503,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7583000063896179},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7224000096321106},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.39079999923706055},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.37299999594688416},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.364300012588501},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.36000001430511475},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.32199999690055847},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.3131999969482422},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.3125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8942999839782715},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7583000063896179},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7224000096321106},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44769999384880066},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4131999909877777},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.37299999594688416},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.364300012588501},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.36000001430511475},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3285999894142151},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.32199999690055847},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.3125},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.30480000376701355},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.2989000082015991},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C115575686","wikidata":"https://www.wikidata.org/wiki/Q18822403","display_name":"Soft sensor","level":3,"score":0.274399995803833},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.27410000562667847},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C117241572","wikidata":"https://www.wikidata.org/wiki/Q5192379","display_name":"Cuckoo search","level":3,"score":0.26660001277923584},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.25270000100135803},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2524999976158142},{"id":"https://openalex.org/C2775973920","wikidata":"https://www.wikidata.org/wiki/Q3252726","display_name":"Selection algorithm","level":3,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/dac.70397","is_oa":false,"landing_page_url":"https://doi.org/10.1002/dac.70397","pdf_url":null,"source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W3032210765","https://openalex.org/W3089775463","https://openalex.org/W3090796516","https://openalex.org/W3157156764","https://openalex.org/W3207295883","https://openalex.org/W3208698114","https://openalex.org/W3212797097","https://openalex.org/W4205957238","https://openalex.org/W4206918024","https://openalex.org/W4210302431","https://openalex.org/W4225014873","https://openalex.org/W4226515342","https://openalex.org/W4281696116","https://openalex.org/W4282568716","https://openalex.org/W4283372767","https://openalex.org/W4283450014","https://openalex.org/W4294308834","https://openalex.org/W4295788744","https://openalex.org/W4305057905","https://openalex.org/W4307019722","https://openalex.org/W4307815869","https://openalex.org/W4311775729","https://openalex.org/W4388100054","https://openalex.org/W4391069054","https://openalex.org/W4391651153","https://openalex.org/W4404926956"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Wireless":[1],"sensor":[2,18],"networks":[3],"(WSNs)":[4],"are":[5,98],"essential":[6],"to":[7,35,64,105,120,138,169,183],"cyber\u2013physical":[8],"systems":[9,43],"with":[10,241],"their":[11],"multiple":[12],"hop,":[13],"self\u2010organized":[14],"arrangement":[15],"of":[16,166],"mobile":[17],"components.":[19],"WSNs":[20,46],"sense,":[21],"aggregate,":[22],"process,":[23],"and":[24,58,68,103,124,152,159,213,222,228,234],"transfer":[25],"data":[26,69,97,149],"across":[27],"a":[28,75],"geographical":[29],"network":[30,80],"area,":[31],"ultimately":[32],"forwarding":[33],"it":[34],"the":[36,106,143,176],"network's":[37],"head.":[38],"Nevertheless,":[39],"existing":[40,242],"intrusion":[41,88,173],"detection":[42,53,89],"(IDS)":[44],"for":[45,87],"face":[47],"various":[48],"limitations":[49],"such":[50],"as":[51],"less":[52],"rates,":[54],"high":[55],"computational":[56,237],"costs,":[57],"significant":[59],"false":[60],"alarm":[61],"rates":[62],"due":[63],"resource":[65],"constraints,":[66],"redundancy,":[67],"correlation.":[70],"To":[71],"address":[72,121],"these":[73],"challenges,":[74],"self\u2010attention\u2013based":[76],"cycle\u2010consistent":[77],"generative":[78],"adversarial":[79],"(SACCGAN),":[81],"enhanced":[82],"using":[83,195],"reptile":[84,177],"search":[85,178],"algorithm":[86,136,179],"in":[90,193],"WSN":[91,148,172],"environments":[92],"(SACCGAN\u2010RSA\u2010IDS\u2010WSN),":[93],"is":[94,131,181,191,201],"proposed.":[95],"The":[96,128,188,198,216],"collected":[99],"through":[100],"WSN\u2010DS":[101,196],"dataset":[102],"supplied":[104],"preprocessing":[107],"stage.":[108],"Preprocessing":[109],"involves":[110],"adjusted":[111],"quick":[112],"shift":[113],"phase":[114],"preserving":[115],"dynamic":[116],"range":[117],"compression":[118],"(AQS\u2010PDC)":[119],"missing":[122],"values":[123],"remove":[125],"redundant":[126],"data.":[127],"feature":[129],"selection":[130],"done":[132],"by":[133],"Pelican":[134],"optimization":[135,167],"(POA)":[137],"identify":[139],"ideal":[140],"features.":[141],"Utilizing":[142],"selected":[144],"features,":[145],"SACCGAN":[146,163,185],"categorizes":[147],"into":[150],"normal":[151],"anomalous":[153],"instances,":[154],"including":[155],"blackhole,":[156],"grayhole,":[157],"flooding,":[158],"scheduling":[160],"attacks.":[161],"However,":[162],"lacks":[164],"adaptation":[165],"modes":[168],"ensure":[170],"accurate":[171],"detection.":[174],"Therefore,":[175],"(RSA)":[180],"introduced":[182],"enhance":[184],"parameters":[186],"effectively.":[187],"proposed":[189],"SACCGAN\u2010RSA\u2010IDS\u2010WSN":[190,199,217],"executed":[192],"Python":[194],"database.":[197],"approach":[200],"examined":[202],"under":[203],"some":[204],"metrics":[205],"like":[206],"recall,":[207],"precision,":[208],"F\u2010measure,":[209],"specificity,":[210],"accuracy,":[211],"RoC,":[212],"computation":[214],"time.":[215],"method":[218],"attains":[219],"28.59%,":[220],"31.43%,":[221],"30.18%":[223],"higher":[224,230],"accuracy;":[225],"33.45%,":[226],"37.67%,":[227],"27.78%":[229],"ROC;":[231],"31.73%,":[232],"33.49%,":[233],"29.15%":[235],"lower":[236],"time":[238],"when":[239],"compared":[240],"techniques.":[243]},"counts_by_year":[],"updated_date":"2026-02-11T22:13:25.172316","created_date":"2026-02-11T00:00:00"}
