Machine learning and blockchain integration for security applications

A Bhandari, AK Cherukuri… - Big Data Analytics and …, 2023 - taylorfrancis.com
The modern world is connected by technology, with endless end devices, servers,
infrastructures, and other resources creating a complex and interesting cyber landscape …

[HTML][HTML] A blockchain and stacked machine learning approach for malicious nodes' detection in internet of things

S Musa Baig, MU Javed, A Almogren, N Javaid… - Peer-to-Peer Networking …, 2023 - Springer
Abstract The Internet of Things (IoT) network is extremely useful in many different fields, such
as smart cities, the military, healthcare, business, and agriculture, among others. The …

Phishing Detection in Blockchain Transaction Networks Using Ensemble Learning

RO Ogundokun, MO Arowolo, R Damaševičius, S Misra - Telecom, 2023 - mdpi.com
The recent progress in blockchain and wireless communication infrastructures has paved
the way for creating blockchain-based systems that protect data integrity and enable secure …

Towards a lightweight identity management and secure authentication for IoT using blockchain

S Ismail, D Dawoud, H Reza - 2022 IEEE World AI IoT …, 2022 - ieeexplore.ieee.org
Handling nodes identities and authentication is one of the current critical security challenges
in an Internet of Things (IoT) environment, which consists of numerous devices with limited …

Enhancing Industrial IoT Network Security through Blockchain Integration

Y Bobde, G Narayanan, M Jati, RSP Raj, I Cvitić… - Electronics, 2024 - mdpi.com
In the rapidly evolving landscape of industrial ecosystems, Industrial IoT networks face
increasing security challenges. Traditional security methods often struggle to protect these …

Malicious node detection using machine learning and distributed data storage using blockchain in WSNs

M Nouman, U Qasim, H Nasir, A Almasoud… - IEEE …, 2023 - ieeexplore.ieee.org
In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster
Heads (CHs) to register the nodes using their credentials and also to tackle various security …

Exploiting machine learning to detect malicious nodes in intelligent sensor‐based systems using blockchain

MBE Sajid, S Ullah, N Javaid, I Ullah… - Wireless …, 2022 - Wiley Online Library
In this paper, a blockchain‐based secure routing model is proposed for the Internet of
Sensor Things (IoST). The blockchain is used to register the nodes and store the data …

Iot sensor networks security mechanisms/techniques

A Murtala Zungeru, JM Chuma, CK Lebekwe… - Green Internet of Things …, 2020 - Springer
In recent years, several efforts have been made by many researchers to emphasize security
issues in the IoT sensor network framework. It is evident from prior research that the area of …

Secure and effective implementation of an IOTA light node using STM32

D Stucchi, R Susella, P Fragneto, B Rossi - Proceedings of the 2nd …, 2019 - dl.acm.org
A major challenge in networked sensor systems and other IoT environments is addressing
security. Vulnerabilities in those systems arise from poor physical security, unauthenticated …

On threat analysis of IoT-based systems: A survey

W Zhao, S Yang, X Luo - … on Smart Internet of Things (SmartIoT), 2020 - ieeexplore.ieee.org
In this paper, we provide a survey on threat analysis of systems based on Internet of Things
(IoT), and how the blockchain technology can help mitigate the threats. Although the topic of …