Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain‐Based Secure Localization against Malicious Nodes in IoT‐Based Wireless Sensor Networks Using Federated Learning
GG Gebremariam, J Panda… - … and mobile computing, 2023 - Wiley Online Library
Wireless sensor networks are the core of the Internet of Things and are used in healthcare,
locations, the military, and security. Threats to the security of wireless sensor networks built …
locations, the military, and security. Threats to the security of wireless sensor networks built …
[HTML][HTML] Secure localization techniques in wireless sensor networks against routing attacks based on hybrid machine learning models
The identification and localization of malicious nodes in wireless sensor networks (WSNs) is
a hot area of research that can considerably extend the network's lifetime and make it more …
a hot area of research that can considerably extend the network's lifetime and make it more …
Localization and detection of multiple attacks in wireless sensor networks using artificial neural network
GG Gebremariam, J Panda… - … and Mobile Computing, 2023 - Wiley Online Library
Security enhancement in wireless sensor networks (WSNs) is significant in different
applications. The advancement of routing attack localization is a crucial security research …
applications. The advancement of routing attack localization is a crucial security research …
A secure localization scheme based on trust assessment for WSNs using blockchain technology
Abstract Wireless Sensor Network (WSN) is one of the integral part of the present ubiquitous
and pervasive computing. The smartness of the applications is incomplete without WSNs …
and pervasive computing. The smartness of the applications is incomplete without WSNs …
Machine learning models to detect the blackhole attack in wireless adhoc network
An Ad-hoc network is used to set up a wireless connection directly from one device to
another computer device. This network is a decentralised network. And it does not have Wi …
another computer device. This network is a decentralised network. And it does not have Wi …
Blockchain powered secure range-free localization in wireless sensor networks
A novel trust-based range-free secure algorithm using blockchain technology is considered
in hostile WSNs for localization. The trust values of beacon nodes are evaluated against …
in hostile WSNs for localization. The trust values of beacon nodes are evaluated against …
Wormhole attack detection techniques in ad-hoc network: A systematic review
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …
communicate without pre-existing infrastructure. Owning to utilization of open medium …
Achieving location error tolerant barrier coverage for wireless sensor networks
Barrier coverage is a critical issue in wireless sensor networks deployed in security
applications (eg, border protection), whose performance strongly depends on the locations …
applications (eg, border protection), whose performance strongly depends on the locations …
An enhanced DV-Hop positioning scheme based on spring model and reliable beacon node set
T Chen, S Hou, L Sun - Computer Networks, 2022 - Elsevier
How to get the node position, as a hotter topic in the field of wireless communication, is the
primary problem to be solved in wireless sensor networks (WSNs). The DV-Hop positioning …
primary problem to be solved in wireless sensor networks (WSNs). The DV-Hop positioning …
Blockloc: Secure localization in the internet of things using blockchain
Several IoT applications are tightly dependent on the locations of the devices. However,
localization algorithms can be easily compromised by injecting false locations. In this paper …
localization algorithms can be easily compromised by injecting false locations. In this paper …