Articles with "malicious node" as a keyword



Photo by timothybuck from unsplash

A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2020 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-019-01492-4

Abstract: As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node detection methods in Wireless Sensor… read more here.

Keywords: malicious node; sensor networks; wireless; wireless sensor ... See more keywords
Photo from wikipedia

Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3111923

Abstract: Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes. In WSNs, security… read more here.

Keywords: malicious node; blockchain based; survey; node detection ... See more keywords
Photo by alex_andrews from unsplash

Evaluation of Node-Metastasis in Sparse Underwater Acoustic Sensor Networks for Localization Under Acoustically Stratified Malicious Node Conditions

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3138025

Abstract: Malicious anchor node is a serious issue in underwater sensor networks. This problem gets compounded under sparse deployment scenario. To overcome this issue, the authors present a Compressed Sensing for Malicious node Compensation theorem (abbreviated… read more here.

Keywords: malicious node; sensor networks; node metastasis; sparse ... See more keywords
Photo from wikipedia

Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3236983

Abstract: In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML)… read more here.

Keywords: malicious node; blockchain; node detection; data storage ... See more keywords
Photo from wikipedia

Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2020.2985050

Abstract: In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious node is a valid… read more here.

Keywords: topology; malicious node; detection; scheme ... See more keywords