Abosata, N., Al-Rubaye, S., Inalhan, G., & Emmanouilidis, C. (2021). Internet of Things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors,21(11), 3654. https://doi.org/10.3390/s21113654 Article Google Scholar
Akhtar, A. K., & Sahoo, G. (2012). Mathematical model for the detection of selfish nodes in MANETs. International Journal of Computer Science and Informatics,5(3), 25–28. Google Scholar
Rahim, M. A., Rahman, M. A., Rahman, M. M., Asyhari, A. T., Bhuiyan, M. Z. A., & Ramasamy, D. (2021). Evolution of IoT-enabled connectivity and applications in automotive industry: A review. Vehicular Communications,27, 100285. https://doi.org/10.1016/j.vehcom.2020.100285 Article Google Scholar
Ávila, K., Sanmartin, P., Jabba, D., & Gómez, J. (2022). An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN. Wireless Personal Communications,122(4), 3687–3718. https://doi.org/10.1007/s11277-021-09107-6 Article Google Scholar
Sobral, J. V. V., Rodrigues, J. J. P. C., Rabêlo, R. A. L., Saleem, K., & Furtado, V. (2019). LOADng-IoT: An enhanced routing protocol for internet of things applications over low power networks. Sensors,19(1), 150. https://doi.org/10.3390/s19010150 Article Google Scholar
Gonçalves, A. J. R., Rabêlo, R. A. L., Rodrigues, J. J. P. C., & Oliveira, L. M. L. (2020). A mobility solution for low power and lossy networks using the LOADng protocol. Transactions on Emerging Telecommunications Technologies,31(12), 1–24. https://doi.org/10.1002/ett.3878 Article Google Scholar
Narayana, S. K., & Hosur, N. T. (2022). Priority based trust efficient routing using ant colony optimization for IoT-based mobile wireless mesh networks. International Journal of Intelligent Engineering and Systems,15(2), 99–106. https://doi.org/10.22266/ijies2022.0430.10 Article Google Scholar
Zhongqiu, J., Shu, Y., & Liangmin, W. (2009). Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attack. In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing. https://doi.org/10.1007/978-3-642-32427-7_18
Theerthagiri, P. (2020). FUCEM: Futuristic cooperation evaluation model using Markov process for evaluating node reliability and link stability in mobile ad hoc network. Wireless Networks,26(6), 4173–4188. https://doi.org/10.1007/s11276-020-02326-y Article Google Scholar
Maragatharajan, M., Balasubramanian, C., & Balakannan, S. P. (2019). A secured MANET using position-based opportunistic routing and SEMI MARKOV process. Concurrency and Computation: Practice and Experience, Wiley,31(14), 1–8. https://doi.org/10.1002/cpe.5047 Article Google Scholar
Chen, L., Thombre, S., Jarvinen, K., Lohan, E. S., Alen-Savikko, A., Leppakoski, H., & Kuusniemi, H. (2017). Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access,5, 8956–8977. https://doi.org/10.1109/ACCESS.2017.2695525 Article Google Scholar
Sengathir, J., & Manoharan, R. (2015). A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs. EURASIP Journal on Wireless Communications and Networking,2015(1), 158. https://doi.org/10.1186/s13638-015-0384-4 Article Google Scholar
Liu, X., & Datta, A. (2012). Modeling context aware dynamic trust using hidden markov model. In Proceedings of the National Conference on Artificial Intelligence (Vol. 3, pp. 1938–1944).
Pathak, P., Chauhan, E., Rathi, S., & Kosti, S. (2018). HMM-Based IDS for Attack Detection and Prevention in MANET. In Lecture Notes in Networks and Systems (Vol. 10, pp. 413–421). https://doi.org/10.1007/978-981-10-3920-1_42
Alam, M. M., Sajid, M. S. I., Wang, W., & Wei, J. (2022). IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms. In 2022 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1695–1700). IEEE. https://doi.org/10.1109/WCNC51071.2022.9771878
Zhang, X., Wu, T., Zheng, Q., Zhai, L., Hu, H., Yin, W., & Cheng, C. (2022). Multi-step attack detection based on pre-trained hidden Markov models. Sensors,22(8), 2874. https://doi.org/10.3390/s22082874 Article Google Scholar
Khan, M. A., & Abuhasel, K. A. (2021). An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things. The Journal of Supercomputing,77(6), 6236–6250. https://doi.org/10.1007/s11227-020-03513-6 Article Google Scholar
Chen, C.-M., Guan, D.-J., Huang, Y.-Z., & Ou, Y.-H. (2016). Anomaly network intrusion detection using hidden Markov model. In International Journal of Innovative Computing, Information and Control (pp. 569–580).
Ingale, S., Paraye, M., & Ambawade, D. (2020). Enhancing Multi-Step Attack Prediction using Hidden Markov Model and Naive Bayes. In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 36–44). IEEE. https://doi.org/10.1109/ICESC48915.2020.9155895
Kalnoor, G., & Gowri Shankar, S. (2022). A model-based system for intrusion detection using novel technique-hidden Markov Bayesian in wireless sensor network. In Proceedings of Third International Conference on ICTCS 2017 (Vol. 40, pp. 43–53). https://doi.org/10.1007/978-981-16-0739-4_4
Roles, A., & ElAarag, H. (2017). Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach. Journal of Algorithms & Computational Technology,11(4), 353–365. https://doi.org/10.1177/1748301817725305 Article Google Scholar
Daniel Jurafsky, J. H. M. (2019). Hidden Markov Models. In Speech and Language Processing (3rd ed. draft) (Vol. 16, pp. 795–796).