Artificial intelligence-based internet of things for industry 5.0

B Chander, S Pal, D De, R Buyya - Artificial intelligence-based internet of …, 2022 - Springer
Abstract In Industry 5.0 paradigm, AI-based systems are the essential component for the
Internet of Things. In most applications, Industry 5.0 showed a significant connection …

Securing wireless sensor networks using machine learning and blockchain: A review

S Ismail, DW Dawoud, H Reza - Future Internet, 2023 - mdpi.com
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs)
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …

Security challenges of blockchain in Internet of things: Systematic literature review

C Ye, W Cao, S Chen - Transactions on Emerging …, 2021 - Wiley Online Library
Since security is the most important issue in the Internet of things (IoT) and blockchain (BC),
this article aims to identify, analyze, and organize the literature about security in the IoT and …

[HTML][HTML] Enabling secure data transmission for wireless sensor networks based IoT applications

U Panahi, C Bayılmış - Ain Shams Engineering Journal, 2023 - Elsevier
The high volume of sensed and transferred data among nodes on wireless sensor networks
makes it necessary to keep the data safe. This study offers an improved security mechanism …

Big data based smart blockchain for information retrieval in privacy-preserving healthcare system

A Ali, MF Pasha, OH Fang, R Khan, MA Almaiah… - Big Data Intelligence for …, 2022 - Springer
In digital healthcare systems, the patients face significant problems identifying an optimal
vacant and available slot for their appointment as the number of patient requests directly …

Effective modelling of sinkhole detection algorithm for edge‐based Internet of Things (IoT) sensing devices

A Bilal, SMN Hasany, AH Pitafi - IET Communications, 2022 - Wiley Online Library
The sinkhole attacks for Internet of Things (IoT) situations can overcome the network and
interrupt communication. Sinkhole attacker nodes can advertise the best possible shortest …

Enhanced Elman spike neural network based intrusion attack detection in software defined Internet of Things network

P Ravi Kiran Varma, S RR… - … and Computation: Practice …, 2023 - Wiley Online Library
In this article, enhanced Elman spike neural network based intrusion attack detection in
software defined IoT network is proposed. Initially, the data's are taken from CICDDoS 2019 …

Green IoT Event Detection for Carbon-Emission Monitoring in Sensor Networks

CD Fay, B Corcoran, D Diamond - Sensors, 2023 - mdpi.com
This research addresses the intersection of low-power microcontroller technology and
binary classification of events in the context of carbon-emission reduction. The study …

Dissemination control in dynamic data clustering for dense IIoT against false data injection attack

C Pedroso, A Santos - International Journal of Network …, 2022 - Wiley Online Library
Summary The Internet of Things (IoT) has made possible the development of increasingly
driven services, like industrial Industrial Internet of Things (IIoT) services, that often deal with …

A Novel Blockchain Approach for Improving the Security and Reliability of Wireless Sensor Networks Using Jellyfish Search Optimizer

VL Vinya, Y Anuradha, HR Karimi, PB Divakarachari… - Electronics, 2022 - mdpi.com
For the past few years, centralized decision-making is being used for malicious node
identification in wireless sensor networks (WSNs). Generally, WSN is the primary technology …