Securing wireless sensor networks using machine learning and blockchain: A review

S Ismail, DW Dawoud, H Reza - Future Internet, 2023 - mdpi.com
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs)
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …

A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities

A Zibaeirad, F Koleini, S Bi, T Hou, T Wang - arXiv preprint arXiv …, 2024 - arxiv.org
In this study, we conduct a comprehensive review of smart grid security, exploring system
architectures, attack methodologies, defense strategies, and future research opportunities …

Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework

M Javed, N Tariq, M Ashraf, FA Khan, M Asim, M Imran - Sensors, 2023 - mdpi.com
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as
healthcare, smart grids, and intelligent transportation systems necessitates robust security …

Routing attacks detection in 6lowpan-based internet of things

A Alazab, A Khraisat, S Singh, S Bevinakoppa… - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities
for applications in various domains. However, the IoT also poses security challenges due to …

Blockchain-based wireless sensor networks for malicious node detection: A survey

LK Ramasamy, FK KP, AL Imoize, JO Ogbebor… - IEEE …, 2021 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking
and surveillance due to their ease of use and other distinctive characteristics compelled by …

Task scheduling in cloud computing using hybrid optimization algorithm

MSA Khan, R Santhosh - Soft computing, 2022 - Springer
Cloud computing provides a wide variety of services, from small to big businesses, to
individual consumers. Cloud computing's features entice users to migrate their operations …

Deep learning approach for intrusion detection in IoT-multi cloud environment

D Selvapandian, R Santhosh - Automated Software Engineering, 2021 - Springer
The possibility of connecting billions of smart end devices in the Internet of Things (IoT)
provides wide range of services to the user. But, the unlimited connectivity of devices in IoT …

[PDF][PDF] Hyperspectral image processing in internet of things model using clustering algorithm

V Bindhu, G Ranganathan - Journal of ISMAC, 2021 - scholar.archive.org
With the advent of technology, several domains have b on Internet of Things (IoT). The hyper
spectral sensors present in earth observation system sends hyper spectral images (HSIs) to …

Genetic algorithm-based oversampling approach to prune the class imbalance issue in software defect prediction

C Arun, C Lakshmi - Soft Computing, 2022 - Springer
Class imbalance is the potential problem that has been existent in machine learning, which
hinders the performance of the classification algorithm when applied in real-world …

A survey on designing a secure smart healthcare system with blockchain

N Chauhan, RK Dwivedi - Mobile Computing and Sustainable Informatics …, 2022 - Springer
Abstract The Internet of Things (IoT) is a new development in information technology that
aims to connect the physical and advanced virtual worlds. IoT depicts a vision of smart and …