Design Guidelines on Trust Management for Underwater Wireless Sensor Networks

R Zhu, A Boukerche, L Long… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In recent years, significant advancements in wireless underwater communication and
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …

[HTML][HTML] Integrating Blockchains with the IoT: A Review of Architectures and Marine Use Cases

AP Delladetsimas, S Papangelou, E Iosif, G Giaglis - Computers, 2024 - mdpi.com
This review examines the integration of blockchain technology with the IoT in the Marine
Internet of Things (MIoT) and Internet of Underwater Things (IoUT), with applications in …

BEKMP: A Blockchain-Enabled Key Management Protocol for Underwater Acoustic Sensor Networks

S Tomović, B Krivokapić, Đ Nađ, I Radusinović - IEEE Access, 2024 - ieeexplore.ieee.org
This paper introduces a new blockchain-assisted key management protocol specifically
designed for clustered Underwater Acoustic Sensor Networks (UASNs). The protocol …

SF‐LAP: Secure M2M Communication in IIoT with a Single‐Factor Lightweight Authentication Protocol

K Shahzad, M Alam, N Javaid, A Waheed… - Journal of …, 2022 - Wiley Online Library
Machine‐to‐machine communication allows smart devices like sensors, actuators, networks,
gateways, and other controllers to communicate with one another. The industrial Internet of …

An improving secure communication using multipath malicious avoidance routing protocol for underwater sensor network

VP Natarajan, S Jayapal - Scientific Reports, 2024 - nature.com
Abstract The Underwater Sensor Network (UWSN) comprises sensor nodes with sensing,
data processing, and communication capabilities. Due to the limitation of underwater radio …

A Decade Review of Authentication and Communication Methods in IoT Environment

R Singh, KP Sharma, LK Awasthi - Wireless Personal Communications, 2024 - Springer
In recent years, the Internet of Things (IoT) has become the most widely adopted technology
worldwide, and its applications can be realized in varying domains. These applications …

SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network

SK Erskine, H Chi, A Elleithy - Sensors, 2023 - mdpi.com
Security is one of the major concerns while designing robust protocols for underwater
sensor networks (UWSNs). The underwater sensor node (USN) is an example of medium …

A privacy-preserving deep learning framework for highly authenticated blockchain secure storage system

SMU Haque, SA Sofi, S Sholla - Multimedia Tools and Applications, 2024 - Springer
To ensure the privacy, integrity, and security of the user data and to prevent the
unauthorized access of data by illegal users in the blockchain storage system is significant …

Digital Incontrovertible Multi Level Key Set Based Node Authentication Model for Malicious Node Detection for Secure Data Transmission in WSN.

DM Krishna Reddy, R Sathya… - International Journal of …, 2023 - search.ebscohost.com
Wireless sensor networks (WSNs) present a paradigm that is both innovative and complex,
characterized by their autonomous operation and the deployment of diminutive, resource …

A Study on Malicious Node Detection in Different Application Domains

B Jayaram, T Sethukarasi… - … Conference on Research …, 2023 - ieeexplore.ieee.org
Nowadays security and privacy in online networks is always questionable due to various
factors in terms of cyber security in the form of attackers present outside the network. In this …