Research Article
Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain
Table 4
Shortest path using the Dijkstra algorithm.
| Paths | Distances (hop) |
| [1, 3, 6, 7] | 9 | [1, 3, 4, 7] | 11 | [1, 2, 4, 5, 7] | 10 | [1, 3, 5–7] | 13 | [1–3, 6, 7] | 8 | [1, 2, 4–7] | 12 |
|
|