Sign Up to like & get
recommendations!
1
Published in 2020 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-019-01492-4
Abstract: As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node detection methods in Wireless Sensor…
read more here.
Keywords:
malicious node;
sensor networks;
wireless;
wireless sensor ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3111923
Abstract: Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes. In WSNs, security…
read more here.
Keywords:
malicious node;
blockchain based;
survey;
node detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3138025
Abstract: Malicious anchor node is a serious issue in underwater sensor networks. This problem gets compounded under sparse deployment scenario. To overcome this issue, the authors present a Compressed Sensing for Malicious node Compensation theorem (abbreviated…
read more here.
Keywords:
malicious node;
sensor networks;
node metastasis;
sparse ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3236983
Abstract: In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML)…
read more here.
Keywords:
malicious node;
blockchain;
node detection;
data storage ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2020.2985050
Abstract: In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious node is a valid…
read more here.
Keywords:
topology;
malicious node;
detection;
scheme ... See more keywords