[HTML][HTML] Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks
OA Khashan - Knowledge-Based Systems, 2024 - Elsevier
In wireless sensor networks (WSNs), the presence of malicious nodes (MNs) poses
significant challenges to data integrity, network stability, and system reliability. These issues …
significant challenges to data integrity, network stability, and system reliability. These issues …
Review of reinforcement learning for robotic gras**: Analysis and recommendations
This review paper provides a comprehensive analysis of over 100 research papers focused
on the challenges of robotic gras** and the effectiveness of various machine learning …
on the challenges of robotic gras** and the effectiveness of various machine learning …
A secure and lightweight trust evaluation model for enhancing decision-making in resource-constrained industrial wsns
The dependability of nodes in an Industrial Wireless Sensor Network (IWSN) is vital for
precise decision-making and the overall functioning of the network. Unreliable nodes have …
precise decision-making and the overall functioning of the network. Unreliable nodes have …
A multi-layered assessment system for trustworthiness enhancement and reliability for industrial wireless sensor networks
The decision-making process in Industrial Wireless Sensor Networks heavily relies on the
information provided by smart sensors. Ensuring the trustworthiness of these sensors is …
information provided by smart sensors. Ensuring the trustworthiness of these sensors is …
Gd3n: Adaptive clustering-based detection of selective forwarding attacks in wsns under variable harsh environments
H Wang, X Huang, Y Wu - Information Sciences, 2024 - Elsevier
Wireless sensor networks (WSNs) are susceptible to numerous security threats due to their
reliance on open environments and broadcast communication methods. Among these, the …
reliance on open environments and broadcast communication methods. Among these, the …
A Novel Machine Learning-Based Trust Management Against Multiple Misbehaviors for Connected and Automated Vehicles
Q Xu, L Zhang, X Qin, Y Zhou - IEEE Transactions on Intelligent …, 2024 - ieeexplore.ieee.org
Connected and Automated Vehicles (CAVs) are exposed to various threats in the dynamic,
open and multi-domain network. Applying machine learning-based trust management for …
open and multi-domain network. Applying machine learning-based trust management for …
Secure WSN Architecture Utilizing Hybrid Encryption with DKM to Ensure Consistent IoV Communication
Reliable communication is essential in the Internet of Vehicles (IoV) framework, where the
efficient transmission of important information is required to ensure vehicle safety and smart …
efficient transmission of important information is required to ensure vehicle safety and smart …
Dual-stage machine learning approach for advanced malicious node detection in WSNs
OA Khashan - Ad Hoc Networks, 2025 - Elsevier
Within wireless sensor networks (WSNs), a multitude of vulnerabilities can arise, particularly
those originating from malicious nodes (MNs), which lead to compromised data integrity …
those originating from malicious nodes (MNs), which lead to compromised data integrity …
EDSSR: a secure and power-aware opportunistic routing scheme for WSNs
Motivated by the pivotal role of routing in Wireless Sensor Networks (WSNs) and the
prevalent security vulnerabilities arising from existing protocols, this research tackles the …
prevalent security vulnerabilities arising from existing protocols, this research tackles the …
A robust detection scheme against selective forwarding attacks in wireless sensor networks under variable harsh environments
L Liu, Y Ma, Y Wu - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
Event-driven wireless sensor networks (EWSNs) often operate in harsh environments and
are susceptible to selective forwarding attacks, where malicious nodes selectively drop …
are susceptible to selective forwarding attacks, where malicious nodes selectively drop …