Blockchain trust model for malicious node detection in wireless sensor networks

W She, Q Liu, Z Tian, JS Chen, B Wang, W Liu - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has been widely used because of its high efficiency and real-
time collaboration. A wireless sensor network is the core technology to support the operation …

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

V Gomathy, N Padhy, D Samanta, M Sivaram… - Journal of Ambient …, 2020 - Springer
In wireless, every device can moves anywhere without any infrastructure also the
information can be maintained constantly for routing the traffic. The open issues of wireless …

Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN

M Hema Kumar, V Mohanraj, Y Suresh… - Journal of Ambient …, 2021 - Springer
The modern wireless sensor network has great impact in the development of various
domains of applications. The presence of malicious nodes introduces various threats and …

Efficient sensitivity orient blockchain encryption for improved data security in cloud

A Siva Kumar, S Godfrey Winster… - Concurrent …, 2021 - journals.sagepub.com
Data security in the cloud has become a dominant topic being discussed in recent times as
the security of data in the cloud has been focused on by several researchers. However, the …

An efficient weighted trust‐based malicious node detection scheme for wireless sensor networks

F Zawaideh, M Salamah - International Journal of …, 2019 - Wiley Online Library
The aim of wireless sensor networks (WSNs) is to gather sensor data from a monitored
environment. However, the collected or reported information might be falsified by faults or …

A comprehensive soft security model for Cognitive Internet of Things

MNZ Abadi, AJ Bidgoly, Y Farjami, EH Khani - Internet of Things, 2023 - Elsevier
Abstract The Cognitive Internet of Things (CIoT) is a rapidly evolving field that combines
artificial intelligence (AI) with the Internet of Things (IoT) ecosystem. By augmenting IoT with …

Sensechain: Blockchain based reputation system for distributed spectrum enforcement

MAA Careem, A Dutta - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
Distributed enforcement of spectrum policies require fusion of sensing results from a set of
spatially scattered sensors to detect anomalous behavior with the highest possible accuracy …

A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT

G Soni, R Sudhakar - 2020 7th International Conference on …, 2020 - ieeexplore.ieee.org
In the Internet of Things (IoT), it is feasible to interconnect networks of different devices and
all these different devices, such as smartphones, sensor devices, and vehicles, are …

An efficient methodology for detecting malicious nodes in cognitive radio networks

DA Kumari - Wireless Personal Communications, 2023 - Springer
An efficient malicious node detection system in CR networks is proposed in this paper. This
proposed system contains features extraction process and optimization algorithm with soft …

Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks

MA Khan, RNB Rais, O Khalid, S Ahmad - Sensors, 2024 - mdpi.com
The Internet of Things (IoT) is empowering various sectors and aspects of daily life. Green
IoT systems typically involve Low-Power and Lossy Networks (LLNs) with resource …