Blockchain‐Based Secure Localization against Malicious Nodes in IoT‐Based Wireless Sensor Networks Using Federated Learning

GG Gebremariam, J Panda… - … and mobile computing, 2023 - Wiley Online Library
Wireless sensor networks are the core of the Internet of Things and are used in healthcare,
locations, the military, and security. Threats to the security of wireless sensor networks built …

A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things

AU Khan, N Javaid, MA Khan, I Ullah - Cluster Computing, 2023 - Springer
A blockchain based scheme is proposed in the underlying work for performing registration,
mutual authentication, data sharing and nonrepudiation in internet of wireless sensor things …

[HTML][HTML] Blockchain based authentication and cluster head selection using DDR-LEACH in internet of sensor things

S Amjad, S Abbas, Z Abubaker, MH Alsharif, A Jahid… - Sensors, 2022 - mdpi.com
This paper proposes a blockchain-based node authentication model for the Internet of
sensor things (IoST). The nodes in the network are authenticated based on their credentials …

Research on multidimensional trust evaluation mechanism of fintech based on blockchain

Y Song, C Sun, Y Peng, Y Zeng, B Sun - IEEE Access, 2022 - ieeexplore.ieee.org
New technologies such as Internet, cloud computing, artificial intelligence (AI) and
blockchain have greatly promoted the innovation of financial industry structure and …

SF‐LAP: Secure M2M Communication in IIoT with a Single‐Factor Lightweight Authentication Protocol

K Shahzad, M Alam, N Javaid, A Waheed… - Journal of …, 2022 - Wiley Online Library
Machine‐to‐machine communication allows smart devices like sensors, actuators, networks,
gateways, and other controllers to communicate with one another. The industrial Internet of …

[HTML][HTML] Towards enhancing the robustness of scale-free IoT networks by an intelligent rewiring mechanism

SM Abbas, N Javaid, AT Azar, U Qasim, ZA Khan… - Sensors, 2022 - mdpi.com
The enhancement of Robustness (R) has gained significant importance in Scale-Free
Networks (SFNs) over the past few years. SFNs are resilient to Random Attacks (RAs) …

Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability

SK Dwivedi, R Amin, S Vollala - Computer Communications, 2023 - Elsevier
The traditional system designed by incorporating the Wireless Sensor Network (WSN)
suffers from important issues such as centralization of information, single source of trust, and …

A Brief Survey on Data Aggregation and Data Compression Models using Blockchain Model in Wireless Sensor Network

BN Sudheer, K Sujatha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Most of the time, nodes in Wireless Sensor Networks (WSNs) are set up in an unmonitored,
potentially dangerous setting. Battery life, storage space, processing power, and network …

A Comprehensive Analysis on Trust Based Secure Routing Protocol used in Internet of Things (IoTs)

BM Shruthi, C Raju - 2023 International Conference on Applied …, 2023 - ieeexplore.ieee.org
Internet of Things (IoTs) is dynamic wireless network developed by utilizing the wireless
nodes and that promises several benefits to the user. The important features of IoTs are less …

A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment

N Ilakkiya, A Rajaram - Multimedia Tools and Applications, 2024 - Springer
In the contemporary technology context, several physical things may be used to support
human activities. The Internet of Things is a cutting-edge technology solution that is used to …