Cities have been growing at an impressive rate, and with the advancement of technology and digitization, new ways have been proposed to provide cities with a certain level of …
In this paper, a blockchained Beyond Fifth Generation (B5G) enabled malicious node detection model is proposed for the Internet of Sensor Things (IoSTs). Moreover, a secure …
Sixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple …
ABSTRACT The dreaded coronavirus (COVID-19) disease traceable to Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV2) has killed thousands of people …
X Fu, R Peng, W Yuan, T Ding, Z Zhang, P Yu… - Electronics, 2023 - mdpi.com
Resource management is a key issue that needs to be addressed in the future smart Internet of Things (IoT). This paper focuses on a Federated Learning (FL)-based resource …
J Xiao, C Li, Z Li, J Zhou - Scientific Reports, 2024 - nature.com
In this paper, we present a novel Secure Clustering Routing Method based on Blockchain and Swarm Intelligence (BS-SCRM) for Wireless Sensor Networks (WSNs), which serves as …
Integrating the Internet into many applications has made securing users' data and maintaining their privacy a significant concern. In recent years, blockchains (BC) have …
B Savoudsou, F Tchakounté, BO Yenke… - … of Computing and …, 2023 - journals.uob.edu.bh
Developing reliable solutions against attacks in wireless sensor networks (WSNs) requires dissecting the attacks to understand activities and strategies exploited by the attackers …
For the past few years, centralized decision-making is being used for malicious node identification in wireless sensor networks (WSNs). Generally, WSN is the primary technology …