Research Article

Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain

Table 2

Feature comparison with respect to proposed model.

ContributionsRef. No.SimilaritiesDifferencesLimitations

Registration and authentication[8]Distributed network authenticationHybrid blockchain different levels of nodes registered at different platformsComplex to manage two blockchains
[30]AuthenticationUse of multiblockchains and cluster managerDifficult to manage

Routing[7]Routing, MN detectionCalculate through QlearningConsumes more energy while discovering the route
[14]Distributed network, routingLocalization-based routingSelect relatively longer path, which causes rapid energy

MN detection[10]Distributed network, registration, MN detectionDetection through network parameters, calculation of node’s reputationUses computationally complex consensus algorithm
[29]Detection through ML, distributed networkSDN-based network, multilevel detectionConsidered very few attacks