Securing wireless sensor networks using machine learning and blockchain: A review

S Ismail, DW Dawoud, H Reza - Future Internet, 2023 - mdpi.com
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs)
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …

Novel intelligent architecture and approximate solution for future networks

A Sarhan, M Jemmali - Plos one, 2023 - journals.plos.org
Private networks have become popular for secure data sharing and anonymous
communication in many domains: enterprise environments, military, journalism …

Analysis of blockchain security: classic attacks, cybercrime and penetration testing

S Kaushik, N El Madhoun - 2023 Eighth International …, 2023 - ieeexplore.ieee.org
Blockchain is an innovative technology that gives built-in security to any software or
application. There is a wide range of applications for blockchain, from risk management to …

A Brief Survey on Data Aggregation and Data Compression Models using Blockchain Model in Wireless Sensor Network

BN Sudheer, K Sujatha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Most of the time, nodes in Wireless Sensor Networks (WSNs) are set up in an unmonitored,
potentially dangerous setting. Battery life, storage space, processing power, and network …

[PDF][PDF] A Study on Blockchain Technologies for Security and Privacy Applications in a Network

T Rajendran, SS Bharathi, S Sridhar… - … International Journal of …, 2023 - researchgate.net
Integrating the Internet into many applications has made securing users' data and
maintaining their privacy a significant concern. In recent years, blockchains (BC) have …

Secure identity key and blockchain‐based authentication approach for secure data communication in multi‐WSN

A Ganeshan, S Jayagopalan, B Perumal… - Concurrency and …, 2023 - Wiley Online Library
Blockchain technology is an effective way to protect data that is handled by wireless sensor
network (WSN). The traditional authentication protocol relies on trusted third parties, and …

Scheduling algorithms for data-protection based on security-classification constraints to data-dissemination

MM Otoom, M Jemmali, WM Khedr, AY Sarhan… - PeerJ Computer …, 2023 - peerj.com
Communication networks have played a vital role in changing people's life. However, the
rapid advancement in digital technologies has presented many drawbacks of the current …

Artificial Intelligence-Based Intrusion Detection and Prevention in Edge-Assisted SDWSN With Modified Honeycomb Structure

J Kipongo, TG Swart, E Esenogho - IEEE access, 2023 - ieeexplore.ieee.org
The software-defined wireless sensor network (SDWSN) has the potential to improve
flexibility, scalability, and network performance, but security and quality of service (QoS) are …

Secure Data Dissemination in Wireless Sensor Networks with The Help of Module Based Blockchain Technology

TJ Swamy, B Pallavi, V Amaraveni… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Wireless Sensor is small, limited energy storage capacity and also using for wide variety of
application. Due to its limited power and storage capacities, it is required to collect the data …

An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique

U Meena, P Sharma - Transactions on Emerging …, 2023 - Wiley Online Library
A secure routing scheme plays an integral role in ensuring the secure routing and efficiency
of wireless sensor networks (WSNs). Recently, many studies have been undertaken to …