1.
A. Arivarasi and P. Ramesh, “RETRACTED ARTICLE: An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. S1. Springer Science and Business Media LLC, pp. 9–9, Mar. 14, 2021. doi: 10.1007/s12652-021-03021-2.
2.
M. Bala Krishna and M. N. Doja, “Deterministic K?means secure coverage clustering with periodic authentication for wireless sensor networks,” International Journal of Communication Systems, vol. 30, no. 4. Wiley, Sep. 24, 2015. doi: 10.1002/dac.3024.
3.
M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L. Shu, “Authentication Protocols for Internet of Things: A Comprehensive Survey,” Security and Communication Networks, vol. 2017. Hindawi Limited, pp. 1–41, 2017. doi: 10.1155/2017/6562953.
4.
M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, May 2018, doi: 10.1016/j.future.2017.11.022.
5.
R. K. Sharma and Dr. P. Gandhi, "Estimate reliability of component-based software system using modified neuro-fuzzy model," International Journal of Engineering & Technology, vol. 6, no. 2. Science Publishing Corporation, p. 45, May 24, 2017. doi: 10.14419/ijet.v6i2.7722.
6.
T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security Services Using Blockchains: A State of the Art Survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 1. Institute of Electrical and Electronics Engineers (IEEE), pp. 858–880, 2019. doi: 10.1109/comst.2018.2863956.
7.
C. V. Nguyen, M. T. Nguyen, T. T. H. Le, T. A. Tran, and D. T. Nguyen, "Blockchain Technology in Wireless Sensor Network: Benefits and Challenges," *ICSES Trans. Comput. Netw. Commun.*, pp. 1-4, 2021.
8.
C. H. Liu and Y. F. Chung, "Secure user authentication scheme for wireless healthcare sensor networks," *Comput. Electr. Eng.*, pp. 250-261, 2017.
9.
R. Riaz, N. A. Gillani, S. Rizvi, S. Shokat, and S. L. Kwon, "SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics," *Wirel. Commun. Mob. Comput.*, pp. 6370742, 2019.
10.
Y. Lu, J. Zhai, R. Zhu, and J. Qin, "Study of Wireless Authentication Center with Mixed Encryption in WSN," *J. Sens.*, vol. 2016, article 9297562, 2016.
11.
R. K. Sharma and P. Gandhi, "Study of Reliability of Object-Oriented Structure Consuming CK Metrics," in *2019 6th International Conference on Computing for Sustainable Global Development (INDIACom)*, pp. 828-831, Mar. 2019.
12.
X. Zhang and F. Wen, "A novel anonymous user WSN authentication for Internet of Things," *Soft Comput.*, vol. 23, pp. 5683-5691, 2019.
13.
T. A. Alghamdi and N. Javaid, "Energy optimization with authentication and cost-effective storage in the wireless sensor IoTs using blockchain,” Computational Intelligence, vol. 40, no. 1. Wiley, Feb. 2024. doi: 10.1111/coin.12630.
14.
R. Vatambeti, E. S. P. Krishna, M. G. Karthik, and V. K. Damera, "Securing the medical data using enhanced privacy preserving based blockchain technology in the Internet of Things," Cluster Computing, vol. 27, no. 2. Springer Science and Business Media LLC, pp. 1625–1637, Jun. 02, 2023. doi: 10.1007/s10586-023-04056-0.
15.
J. Xiao, C. Li, Z. Li, and J. Zhou, “BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques,” Scientific Reports, vol. 14, no. 1. Springer Science and Business Media LLC, Apr. 27, 2024. doi: 10.1038/s41598-024-60338-6.
16.
M. A. de Jesus et al., “Security in Blockchain?Based Smart Cyber?Physical Applications Relying on Wireless Sensor and Actuators Networks,” Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection. Wiley, pp. 279–310, Mar. 22, 2024. doi: 10.1002/9781394196470.ch14.
17.
Sureshkumar, C.; Sabena, S. Fuzzy-Based Secure Authentication and Clustering Algorithm for Improving the Energy Efficiency in Wireless Sensor Networks. Wirel. Pers. Commun. 2020, 112, pp. 1517–1536.
18.
Bao, Z.; Shi, W.; He, D.; Choo, K.R. IoTChain: A Three-Tier Blockchain-based IoT Security Architecture. arXiv 2018, arXiv:1806.02008v2.
19.
Sharma, R. K., & Gandhi, P. (2016, March). Quality assurance of component-based software systems. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 3850-3854). IEEE.
20.
Yavari, M.; Safkhani, M.; Kumari, S.; Kumar, S.; Chen, C.M. An Improved Blockchain-Based Authentication Protocol for IoT Network Management. Secure. Commun. Netw. 2020, 2020, 8836214
21.
Alan, C.H.L.; Yeung, K.H.; Yan, F. Blockchain-based authentication in IoT networks. In Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, 10–13 December 2018; pp. 1–8.
22.
Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. A Lightweight Blockchain Based Framework for Underwater IoT. Electronics 2019, 8, 1552.
23.
Gandhi, P., Khan, M. Z., Sharma, R. K., Alhazmi, O. H., Bhatia, S., &Chakraborty, C. (2022). Software Reliability Assessment Using Hybrid Neuro-Fuzzy Model. Computer Systems Science & Engineering, 41(3).
24.
Dong, S.; Yang, H.; Yuan, J.; Jiao, L.; Yu, A.; Zhang, J. Blockchain-based cross-domain authentication strategy for trusted access to mobile devices in the IoT. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1–3
25.
Goyat, R.; Kumar, G.; Saha, R.; Conti, M.; Rai, M.K.; Thomas, R.; Alazab, M.; Hoon-Kim, T. Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things. IEEE Internet Things J. 2020, 9, 14203–14215.
26.
Yazdinejad, A.; Parizi, R.M.; Srivastava, G.; Dehghantanha, A.; Choo, K.K.R. Energy efficient decentralized authentication in the internet of underwater things using blockchain. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6.
27.
Hong, S. P2P networking-based Internet of Things (IoT) sensor node authentication by blockchain. Peer-Peer Netw. Appl. 2020, 13, pp. 579–589.
28.
Almadhoun, R.; Kadadha, M.; Alhemeiri, M.; Alshehhi, M.; Salah, K. A User Authentication Scheme of IoT Devices using Blockchain-enabled Fog Nodes. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; pp. 1–8
29.
Rathod, T.; Jadav, N.K.; Alshehri, M.D.; Tanwar, S.; Sharma, R.; Felseghi, R.-A.; Raboaca, M.S. Blockchain for Future Wireless Networks: A Decade Survey. Sensors 2022, 22, 4182. https://doi.org/10.3390/s22114182
30.
K. Suresh Kumar, R. Rajeswari, Ch Vidyadhari, and B. Santhosh Kumar. "Mathematical modeling approaches for blockchain technology." In IOP conference series: materials science and engineering, vol. 981, no. 2, p. 022001. IOP Publishing, 2020.
31.
Sharma C, Vaid R. “Analysis of existing protocols in WSN based on key parameters” In Proceedings of 2nd international conference on communication, computing and networking, Volume16, PP.165171, ISSN (electronic):2367-3389.Springer, Singapore,2019.
32.
Sharma C, Vaid R." A Novel Sybil Attack Detection and Prevention Mechanism for Wireless Sensor Network. In 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) 2021 Oct 7 pp.340-345.IEEE.
33.
Sharma C.Vaid R "Energy –Efficient and Secure Data Forwarding Mechanism for Balancing Cluster Lifetime for Huge Size Wireless Sensor Network' Journal of Computational and Theoretical Nanoscience, Volume 16, No 9, pp. 3961-3964, ISSN (Online):1546-1955, September 2019.
34.
Sharma C., Vaid R. and Gupta K “KDS: Keyless Data Security in Wireless Sensor Networks” 3rd International Conference on ‘Mobile Radio Communications & 5G Network (MRCN-2022) in University Institute of Engineering &Technology, Kurukshetra University, Volume588, pp 613-624, Springer, Singapore. https://doi.org/10.1007/978-981-19-7992-8_51.
35.
Tejbir Singh, Rohit Vaid, and Avinash Sharma. "Security Issues in Blockchain Integrated WSN: Challenges and Concerns." In 2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), DOI:10.1109/ICSES55317.2022.9914006 pp. 1-5. IEEE, 2022.
36.
Mohd Younus Dar and Tejbir Singh. “Study of Security to Block Chain under Wireless Sensor Network (WSN)”. International Journal of Wireless Network Security, Volume 7, Issue 2, PP. 1-7, Journal Pub, 2021.
37.
Singh, T., Vaid, R. (2023). Enigmas of Various Techniques to Implementing Authentication and Integrity in Blockchain-Based Wireless Sensor Networks. Lecture Notes in Electrical Engineering, vol 1040. Springer, Singapore. https://doi.org/10.1007/978-981-99-2271-0_29.