Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks

Z Abubaker, N Javaid, A Almogren, M Akbar, M Zuair… - Computer Networks, 2022 - Elsevier
In this paper, a blockchained Beyond Fifth Generation (B5G) enabled malicious node
detection model is proposed for the Internet of Sensor Things (IoSTs). Moreover, a secure …

A study on boundary detection in wireless sensor networks

S Kundu, N Das - Innovations in Systems and Software Engineering, 2023 - Springer
In wireless sensor networks (WSN), a group of sensor nodes are distributed to oversee an
area round the clock so that in case of an unnatural event, like forest fire, earth quake, air …

A novel epidemic model for wireless rechargeable sensor network security

G Liu, B Peng, X Zhong - Sensors, 2020 - mdpi.com
With the development of wireless rechargeable sensor networks (WRSNs), security issues of
WRSNs have attracted more attention from scholars around the world. In this paper, a novel …

Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN

R Das, M Dwivedi - Journal of Reliable Intelligent Environments, 2024 - Springer
The widespread use of hierarchical wireless sensor networks (HWSN) in various industries,
including environmental monitoring, healthcare, and intrusion detection, has made the …

A quasi-affine transformation evolutionary algorithm enhanced by hybrid Taguchi strategy and its application in fault detection of wireless sensor network

JS Pan, RY Wang, SC Chu, KK Tseng, F Fan - Symmetry, 2023 - mdpi.com
A quasi-affine transformation evolutionary algorithm improved by the Taguchi strategy, levy
flight and the restart mechanism (TLR-QUATRE) is proposed in this paper. This algorithm …

Dual-stage machine learning approach for advanced malicious node detection in WSNs

OA Khashan - Ad Hoc Networks, 2025 - Elsevier
Within wireless sensor networks (WSNs), a multitude of vulnerabilities can arise, particularly
those originating from malicious nodes (MNs), which lead to compromised data integrity …

Classification of misbehaving nodes in MANETS using machine learning techniques

S Kanthimathi, JR Prathuri - 2020 2nd PhD Colloquium on …, 2020 - ieeexplore.ieee.org
Classification of Misbehaving Nodes in wireless mobile adhoc networks (MANET) by
applying machine learning techniques is an attempt to enhance security by detecting the …

Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks

R Das, M Dwivedi - Peer-to-Peer Networking and Applications, 2022 - Springer
The clustering scheme in Hierarchical Wireless Sensor Network (HWSN) reduces the delay,
energy consumption, high scalability, and reduces network traffic but during transmission of …

Detection of faulty nodes in distributed environment using machine learning

RS Gaykar, V Khanaa, SD Joshi - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Faulty nodes are expected to have a significant effect on the performance of Big Data
systems. The cause of discharges, on the other hand, is a complex issue. The previous work …

Identification of straggler node in distributed environment using soft computing algorithms

RS Gaykar, C Nalini, SD Joshi - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Node straggling is most impactful thing to improve the Quality of Service (QoS) in distributed
as well as cloud environment. On the other hand, the reason for which node discharges are …