2023
DOI: 10.32604/cmc.2023.032549
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Driven Metaheuristic Route Planning in Secure Wireless Sensor Networks

Abstract: Recently, Internet of Things (IoT) has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track applications. Wireless sensor network (WSN) is a vital element of IoT paradigm since its inception and has developed into one of the chosen platforms for deploying many smart city application regions such as disaster management, intelligent transportation, home automation, smart buildings, and other such IoT-based application. The routing ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…A group of researchers devoted their scientific work to assessing the role of small business in the socio-economic development of the state [49], as well as in employment [50,51], increasing per capita income and growth of national welfare. Modern research is aimed at assessing the impact of new technologies (virtual reality, digital money, blockchain technology) on the development of small business [52][53][54]. It is proposed to modernize also the government support of business with the help of new credit, marketing and financial technologies [55].…”
Section: Discussionmentioning
confidence: 99%
“…A group of researchers devoted their scientific work to assessing the role of small business in the socio-economic development of the state [49], as well as in employment [50,51], increasing per capita income and growth of national welfare. Modern research is aimed at assessing the impact of new technologies (virtual reality, digital money, blockchain technology) on the development of small business [52][53][54]. It is proposed to modernize also the government support of business with the help of new credit, marketing and financial technologies [55].…”
Section: Discussionmentioning
confidence: 99%
“…Security and Performance (SAP) is an activity that needs to be incorporated in every system software. It enables verification and validation of development process to minimize bugs, errors, mistakes and optimize accuracy and computation cost SAP verification activities not well planned [200] Lack of awareness on SAP verification activities, should be included in development process. It is not clear how individual security components contribute overall to software security [87] The software developers have a perception that writing of code has some elements of security (validation of inputs, use of security mechanisms) Programmers explicitly depend on conventional security checks such as use of passwords or biometric for login, validation of input fields, abstraction, access modifiers, exception handling These may not be reliable to attacks such as insider threats?…”
Section: Figure 2 Threat Modeling Process [61]mentioning
confidence: 99%
“…There is therefore need to identify the mediating factors influencing SAP verification and the actions to promote them. Unfortunately, SAP verification is normally not well planned, and hence the software team must reprioritize verification activities multiple times [200]. This increases the required time and effort.…”
Section: Research Gapsmentioning
confidence: 99%
“…Analyzing the above, it should be noted that the existing method of harvesting and transportation has a number of significant drawbacks and does not meet the requirements for increasing the production of raw cotton. A promising solution to this issue is the use of containers for harvesting, loading and unloading and transportation of raw cotton [17][18][19][20][21][22].…”
Section: Introductionmentioning
confidence: 99%