[HTML][HTML] Energy-aware Proof-of-Authority: Blockchain Consensus for Clustered Wireless Sensor Network

D Hanggoro, JH Windiatmaja, A Muis, RF Sari… - Blockchain: Research …, 2024 - Elsevier
This study addresses integrating blockchain technology into lightweight devices, specifically
on clustered Wireless Sensor Networks (WSNs). Integrating blockchain in the WSNs solved …

Detecting blockchain security threats

B Putz, G Pernul - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
In many organizations, permissioned blockchain networks are currently transitioning from a
proof-of-concept stage to production use. A crucial part of this transition is ensuring …

Blockchain-based security mechanisms for IoMT Edge networks in IoMT-based healthcare monitoring systems

F Pelekoudas-Oikonomou, G Zachos, M Papaioannou… - Sensors, 2022 - mdpi.com
Despite the significant benefits that the rise of Internet of Medical Things (IoMT) can bring
into citizens' quality of life by enabling IoMT-based healthcare monitoring systems, there is …

An integrated blockchain approach to model secure internet of things based systems

PM Jacob, P Mani, S Simon… - … Conference on Data …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) made a tremendous change in the field of automation technologies.
Objects or Things in the real world can be converted into asmart object'by attaching some …

Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning

D Saveetha, G Maragatham - Pattern Recognition Letters, 2022 - Elsevier
Cyber-attacks are getting more sophisticated and nuanced. Intrusion Detection Systems
(IDSs) are commonly used in a variety of networks to assist in the timely detection of …

Cryptography and blockchain solutions for security protection of internet of things applications

K Pal - Information security practices for the internet of things …, 2022 - igi-global.com
In recent decades, the industrial applications of the internet of things (IoT) have been
attracting massive motivation for research and improvement of industrial operations. The IoT …

[PDF][PDF] Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme.

MA Alohali, M Elsadig, FN Al-Wesabi… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
With recent advancements in information and communication technology, a huge volume of
corporate and sensitive user data was shared consistently across the network, making it …

Blockchain‐Based Secure Localization against Malicious Nodes in IoT‐Based Wireless Sensor Networks Using Federated Learning

GG Gebremariam, J Panda… - … and mobile computing, 2023 - Wiley Online Library
Wireless sensor networks are the core of the Internet of Things and are used in healthcare,
locations, the military, and security. Threats to the security of wireless sensor networks built …

Resilient security framework using TNN and blockchain for IOMT

RA Alsemmeari, MY Dahab, AA Alsulami, B Alturki… - Electronics, 2023 - mdpi.com
The growth of the Internet of Things (IoT) devices in the healthcare sector enables the new
era of the Internet of Medical Things (IoMT). However, IoT devices are susceptible to various …

Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques

K Venkatesan, SB Rahayu - Scientific Reports, 2024 - nature.com
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML)
techniques to address the challenges and vulnerabilities in blockchain networks …