Research Article

Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain

Table 4

Shortest path using the Dijkstra algorithm.

PathsDistances (hop)

[1, 3, 6, 7]9
[1, 3, 4, 7]11
[1, 2, 4, 5, 7]10
[1, 3, 57]13
[13, 6, 7]8
[1, 2, 47]12