Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …
it enables its consumers to improve their lifestyles and professionally keep up with the …
Securing wireless sensor networks using machine learning and blockchain: A review
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs)
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …
Blockchain-based privacy-preserving and rewarding private data sharing for IoT
The Internet of Things (IoT) devices possessed by individuals produce massive amounts of
data. The private data onto specific IoT devices can be combined with intelligent platform to …
data. The private data onto specific IoT devices can be combined with intelligent platform to …
Malicious node detection using machine learning and distributed data storage using blockchain in WSNs
In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster
Heads (CHs) to register the nodes using their credentials and also to tackle various security …
Heads (CHs) to register the nodes using their credentials and also to tackle various security …
Blockchain-Aided secure access control for UAV computing networks
Multiple unmanned aerial vehicles (UAVs) form a UAV cluster, which relies on wireless
communication networks to facilitate information interaction among the UAVs. UAV clusters …
communication networks to facilitate information interaction among the UAVs. UAV clusters …
Is semi‐selfish mining available without being detected?
Selfish mining attacks get a high prize due to the additional rewards unproportionate to their
mining power (mining pools have particular advantages). Generally, this category of attacks …
mining power (mining pools have particular advantages). Generally, this category of attacks …
[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey
M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …
Internet of Things (IoT), decentralized approaches for trust management are gaining …
Blockchain based secure routing and trust management in wireless sensor networks
In this paper, an encryption and trust evaluation model is proposed on the basis of a
blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) …
blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) …
A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
AK Gautam, R Kumar - SN Applied Sciences, 2021 - Springer
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide
and are used continuously in a range of critical applications. Any damage or compromise to …
and are used continuously in a range of critical applications. Any damage or compromise to …
Bs-scrm: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques
J **ao, C Li, Z Li, J Zhou - Scientific Reports, 2024 - nature.com
In this paper, we present a novel Secure Clustering Routing Method based on Blockchain
and Swarm Intelligence (BS-SCRM) for Wireless Sensor Networks (WSNs), which serves as …
and Swarm Intelligence (BS-SCRM) for Wireless Sensor Networks (WSNs), which serves as …