IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

GAN-Based Privacy Protection for Public Data Sharing in Wireless Sensor Networks

GAN-Based Privacy Protection for Public Data Sharing in Wireless Sensor Networks
View Sample PDF
Author(s): Swaminathan Kalyanaraman (University College of Engineering, Anna University, Pattukkottai, India), Sivaram Ponnusamy (Sandip University, India), S. Saju (MIET Engineering College, India), R. Vijay (Saranathan College of Engineering, India)and R. Karthikeyan (University College of Engineering, Pattukkottai, India)
Copyright: 2024
Pages: 15
Source title: Enhancing Security in Public Spaces Through Generative Adversarial Networks (GANs)
Source Author(s)/Editor(s): Sivaram Ponnusamy (Sandip University, Nashik, India), Jilali Antari (Ibn Zohr Agadir University, Morocco), Pawan R. Bhaladhare (Sandip University, Nashik, India), Amol D. Potgantwar (Sandip University, Nashik, India)and Swaminathan Kalyanaraman (Anna University, Trichy, India)
DOI: 10.4018/979-8-3693-3597-0.ch018

Purchase

View GAN-Based Privacy Protection for Public Data Sharing in Wireless Sensor Networks on the publisher's website for pricing and purchasing information.

Abstract

In this study, the authors introduce “SecureNetGAN,” a novel system designed to protect wireless sensor networks (WSNs) from cyber threats through the use of generative adversarial networks (GANs). WSNs are crucial in various applications, from environmental monitoring to securing borders, but they're often targeted by hackers due to their critical nature. The challenge is that traditional security systems can't always keep up with the constantly changing tactics of these attackers. That's where SecureNetGAN comes in. SecureNetGAN leverages the power of GANs, a type of artificial intelligence where two parts of the system, the generator and the discriminator, work against each other. The generator learns to create data that looks like network attacks, while the discriminator gets better at telling real attacks from fake ones.

Related Content

Rais Abdul Hamid Khan, Yogesh Kantilal Sharma, Mandar S Karyakarte, Bipin Sule, Aarti Amod Agarkar. © 2024. 11 pages.
Dwijendra Nath Dwivedi, Ghanashyama Mahanty, Shafik Khashouf. © 2024. 14 pages.
Patel Janit Umeshbhai, Panchal Yash Kanubhai, Shaikh Mohammed Bilal, Shanti Verma. © 2024. 13 pages.
Swaminathan Kalyanaraman, Sivaram Ponnusamy, S. Saju, S. Sangeetha, R. Karthikeyan. © 2024. 14 pages.
Delshi Howsalya Devi, P. Santhosh Kumar, M. Aruna, S. Sharmila. © 2024. 23 pages.
Mamta P. Khanchandani, Sanjay H. Buch, Shanti Verma, K. Baskar. © 2024. 13 pages.
Harshita Chourasia, Neha Tiwari, Shraddha Raut, Anansingh Thinakaran, Anirudh A. Bhagwat. © 2024. 13 pages.
Body Bottom