The security of big data in fog-enabled IoT applications including blockchain: A survey

N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi… - Sensors, 2019 - mdpi.com
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

AK Gautam, R Kumar - SN Applied Sciences, 2021 - Springer
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide
and are used continuously in a range of critical applications. Any damage or compromise to …

Enhancing medical smartphone networks via blockchain-based trust management against insider attacks

W Meng, W Li, L Zhu - IEEE Transactions on Engineering …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has gradually become one of the most important platforms across
different disciplines, by enabling dedicated physical objects to communicate with other …

Systematic literature review on energy efficient routing schemes in WSN–a survey

M Shafiq, H Ashraf, A Ullah, S Tahira - Mobile Networks and Applications, 2020 - Springer
In wireless sensor networks (WSN), routing is quite challenging area of research where
packets are forwarded through multiple nodes to the base station. The packet being sent …

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

V Gomathy, N Padhy, D Samanta, M Sivaram… - Journal of Ambient …, 2020 - Springer
In wireless, every device can moves anywhere without any infrastructure also the
information can be maintained constantly for routing the traffic. The open issues of wireless …

Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system

G Zhang, T Wang, G Wang, A Liu… - … and computation: practice …, 2021 - Wiley Online Library
With the popularity of Sensor‐Cloud, its security issues get more attention from industry and
academia. Especially, Sensor‐Cloud underlying network is very vulnerable to internal …

A trust based secure intelligent opportunistic routing protocol for wireless sensor networks

DK Bangotra, Y Singh, A Selwal, N Kumar… - Wireless Personal …, 2022 - Springer
The need for reliable transmission of data packets is becoming more critical as Wireless
Sensor Networks (WSN) gain popularity. Reliable delivery of data packets is possible only …

Trust-based clustering and best route selection strategy for energy efficient wireless sensor networks

G Sudha, C Tharini - Automatika: časopis za automatiku, mjerenje …, 2023 - hrcak.srce.hr
Sažetak Energy efficiency is one of the most researchable topics of the energy constrained
Wireless Sensor Networks (WSN). Due to the widespread usage of WSN in real-time …

A trusted distributed routing scheme for wireless sensor networks using blockchain and meta‐heuristics‐based deep learning technique

M Revanesh, V Sridhar - Transactions on Emerging …, 2021 - Wiley Online Library
The wireless sensor network (WSN) with fluctuating environs might be susceptible to diverse
types of malicious cyber‐attacks, and they are mostly dependent on the authentication and …

Towards Trusted Green Computing for Wireless Sensor Networks: Multi Metric Optimization Approach.

RS Rathore, S Sangwan… - Adhoc & Sensor …, 2021 - search.ebscohost.com
Energy is an astronomical issue in the WSNs environment because the sensor nodes are
operated with a limited power battery. Hence, energy harvesting (EH) techniques are …