[HTML][HTML] Assessing Critical Entities: Risk Management for IoT Devices in Ports
I Argyriou, T Tsoutsos - Journal of Marine Science and Engineering, 2024 - mdpi.com
Integrating Internet of Things (IoT) devices into port operations has brought substantial
improvements in efficiency, automation, and connectivity. However, this technological …
improvements in efficiency, automation, and connectivity. However, this technological …
State Evaluation of Self-Powered Wireless Sensors Based on a Fuzzy Comprehensive Evaluation Model
S ** for Sustainable Wireless Sensor Networks Using Blockchain Technology
U Draz, T Ali, S Yasin, M Hijji, M Ayaz, ELHM Aggoune - Mathematics, 2025 - preprints.org
Wireless sensor networks deployed in energy-constrained environments face critical
challenges relating to sustainability and protection. This paper introduces an innovative …
challenges relating to sustainability and protection. This paper introduces an innovative …
Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach.
Abstract Information security has emerged as a crucial consideration over the past decade
due to escalating cyber security threats, with Internet of Things (IoT) security gaining …
due to escalating cyber security threats, with Internet of Things (IoT) security gaining …
Blockchain-Enhanced IoT Sensor Data Management for Engineering Monitoring
Q Wang, Z Wang - IEEE Sensors Journal, 2024 - ieeexplore.ieee.org
In engineering monitoring and IoT sensor networks, ensuring data security and real-time
performance is a critical challenge. Traditional centralized data management faces issues …
performance is a critical challenge. Traditional centralized data management faces issues …
Malicious node detection using SVM and secured data storage using blockchain in WSN
Abstract Wireless Sensor Networks (WSNs) have numerous important applications, but their
vulnerability to malicious nodes seriously compromises data integrity and network reliability …
vulnerability to malicious nodes seriously compromises data integrity and network reliability …