Sign Up to like & get
recommendations!
1
Published in 2020 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-019-01492-4
Abstract: As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node detection methods in Wireless Sensor…
read more here.
Keywords:
malicious node;
sensor networks;
wireless;
wireless sensor ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3111923
Abstract: Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes. In WSNs, security…
read more here.
Keywords:
malicious node;
blockchain based;
survey;
node detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3138025
Abstract: Malicious anchor node is a serious issue in underwater sensor networks. This problem gets compounded under sparse deployment scenario. To overcome this issue, the authors present a Compressed Sensing for Malicious node Compensation theorem (abbreviated…
read more here.
Keywords:
malicious node;
sensor networks;
node metastasis;
sparse ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3236983
Abstract: In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML)…
read more here.
Keywords:
malicious node;
blockchain;
node detection;
data storage ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2020.2985050
Abstract: In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious node is a valid…
read more here.
Keywords:
topology;
malicious node;
detection;
scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2023.3300809
Abstract: With the emergence of new and exciting wireless technologies and capabilities, Unmanned Aerial Vehicles (UAVs) and the services they allow, stand to be a major influencer in our daily lives. Unfortunately, they are also prone…
read more here.
Keywords:
node uav;
uav network;
malicious node;
network ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "International Journal of Computing"
DOI: 10.47839/ijc.24.2.4017
Abstract: Throughout the past decade, wireless sensor networks (WSNs) have become a focus of observation in the wireless and mobile computing research community. The WSN has many uses, and applications from inside (starting from measuring temperature,…
read more here.
Keywords:
node detection;
sensor networks;
wireless;
malicious node ... See more keywords