Hina Nasir
YOU?
Author Swipe
View article: Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs
Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs Open
In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML) classifier, term…
View article: Blockchain Based Privacy Preserving Authentication and Malicious Node Detection in Internet of Underwater Things (IoUT) Networks
Blockchain Based Privacy Preserving Authentication and Malicious Node Detection in Internet of Underwater Things (IoUT) Networks Open
The usage of Internet of Underwater Things (IoUT) Networks allows for the detection of a variety of aquatic factors like temperature, pressure, pollution, etc. They are also used to forecast the ocean’s weather to collect information about…
View article: Analysis of Packet Diversity in Buffer-Aided Relaying over Symmetric and Asymmetric Rayleigh Fading Channels
Analysis of Packet Diversity in Buffer-Aided Relaying over Symmetric and Asymmetric Rayleigh Fading Channels Open
In this paper, we propose innovative schemes for relay selection that jointly explore packet selection and relay selection for buffer-aided amplify and forward (AF) cooperative relaying networks. The first proposed scheme chooses the most …
View article: Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks
Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks Open
This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs); performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative r…