Articles with "malicious node" as a keyword



A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2020 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-019-01492-4

Abstract: As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node detection methods in Wireless Sensor… read more here.

Keywords: malicious node; sensor networks; wireless; wireless sensor ... See more keywords
Photo from wikipedia

Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3111923

Abstract: Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes. In WSNs, security… read more here.

Keywords: malicious node; blockchain based; survey; node detection ... See more keywords

Evaluation of Node-Metastasis in Sparse Underwater Acoustic Sensor Networks for Localization Under Acoustically Stratified Malicious Node Conditions

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3138025

Abstract: Malicious anchor node is a serious issue in underwater sensor networks. This problem gets compounded under sparse deployment scenario. To overcome this issue, the authors present a Compressed Sensing for Malicious node Compensation theorem (abbreviated… read more here.

Keywords: malicious node; sensor networks; node metastasis; sparse ... See more keywords

Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3236983

Abstract: In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML)… read more here.

Keywords: malicious node; blockchain; node detection; data storage ... See more keywords

Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2020.2985050

Abstract: In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious node is a valid… read more here.

Keywords: topology; malicious node; detection; scheme ... See more keywords

Identifying a Malicious Node in a UAV Network

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2023.3300809

Abstract: With the emergence of new and exciting wireless technologies and capabilities, Unmanned Aerial Vehicles (UAVs) and the services they allow, stand to be a major influencer in our daily lives. Unfortunately, they are also prone… read more here.

Keywords: node uav; uav network; malicious node; network ... See more keywords

Malicious Node Detection in Wireless Sensor Networks Using Neural Networks

Sign Up to like & get
recommendations!
Published in 2025 at "International Journal of Computing"

DOI: 10.47839/ijc.24.2.4017

Abstract: Throughout the past decade, wireless sensor networks (WSNs) have become a focus of observation in the wireless and mobile computing research community. The WSN has many uses, and applications from inside (starting from measuring temperature,… read more here.

Keywords: node detection; sensor networks; wireless; malicious node ... See more keywords