Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

Securing wireless sensor networks using machine learning and blockchain: A review

S Ismail, DW Dawoud, H Reza - Future Internet, 2023 - mdpi.com
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs)
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …

Blockchain-based privacy-preserving and rewarding private data sharing for IoT

T Li, H Wang, D He, J Yu - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) devices possessed by individuals produce massive amounts of
data. The private data onto specific IoT devices can be combined with intelligent platform to …

Malicious node detection using machine learning and distributed data storage using blockchain in WSNs

M Nouman, U Qasim, H Nasir, A Almasoud… - IEEe …, 2023 - ieeexplore.ieee.org
In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster
Heads (CHs) to register the nodes using their credentials and also to tackle various security …

Blockchain-Aided secure access control for UAV computing networks

J Wang, Z Jiao, J Chen, X Hou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Multiple unmanned aerial vehicles (UAVs) form a UAV cluster, which relies on wireless
communication networks to facilitate information interaction among the UAVs. UAV clusters …

Is semi‐selfish mining available without being detected?

T Li, Z Wang, Y Chen, C Li, Y Jia… - International Journal of …, 2022 - Wiley Online Library
Selfish mining attacks get a high prize due to the additional rewards unproportionate to their
mining power (mining pools have particular advantages). Generally, this category of attacks …

[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey

M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …

Blockchain based secure routing and trust management in wireless sensor networks

S Awan, N Javaid, S Ullah, AU Khan, AM Qamar… - Sensors, 2022 - mdpi.com
In this paper, an encryption and trust evaluation model is proposed on the basis of a
blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) …

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

AK Gautam, R Kumar - SN Applied Sciences, 2021 - Springer
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide
and are used continuously in a range of critical applications. Any damage or compromise to …

Bs-scrm: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques

J **ao, C Li, Z Li, J Zhou - Scientific Reports, 2024 - nature.com
In this paper, we present a novel Secure Clustering Routing Method based on Blockchain
and Swarm Intelligence (BS-SCRM) for Wireless Sensor Networks (WSNs), which serves as …