[1] Hassan W.H.,2019. Current research on internet of things (IoT) security: A survey.Computer Networks, 148, pp. 283-294. [2] Wang K., Hong Y., Li Y., Yan R., andFeng J., 2025. A distributed zero-trust scheme for airborne wireless sensor networks using dynamic identity authentication.Scientific Reports, 15(1), 8036. [3] Vikas, Wahi C., Sagar B.B., andManjul M., 2025. Trusted energy-aware hierarchical routing (TEAHR) for wireless sensor networks.Sensors, 25(8), 2519. [4] Chen B., Qiao S., Zhao J., Liu D., Shi X., Lyu M., Chen H., Lu H., andZhai Y., 2020. A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE Internet of Things Journal,8(13), pp. 10248-10263. [5] Laghari A.A., Khan A.A., Ksibi A., Hajjej F., Kryvinska N., Almadhor A., Mohamed M.A., andAlsubai S., 2025. A novel and secure artificial intelligence enabled zero trust intrusion detection in industrial internet of things architecture.Scientific Reports, 15(1), 26843. [6] Nie S., Ren J., Wu R., Han P., Han Z., andWan W., 2025. Zero-trust access control mechanism based on blockchain and inner-product encryption in the internet of things in a 6g environment.Sensors, 25(2), 550. [7] Dhar S., andBose I., 2021. Securing IoT devices using zero trust and blockchain. Journal of Organizational Computing and Electronic Commerce,31(1), pp. 18-34. [8] Al Sukkar G., andAl-Sharaeh S., 2025. Enhancing security in wireless sensor networks: A machine learning-based DoS attack detection. Engineering, Technology & Applied Science Research,15(1), pp. 19712-19719. [9] Alansari Z., Anuar N.B., Kamsin A., andBelgaum M.R., 2023. RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based internet of things.PeerJ Computer Science, 9, e1309. [10] Garg R., Gulati T., andKumar S., 2023. Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks. Peer-to-Peer Networking and Applications,16(6), pp. 2833-2849. [11] Ghosal A., Saha A., andDas Bit S., 2013. Energy saving replay attack prevention in clustered wireless sensor networks. InPacific-Asia Workshop on Intelligence and Security Informatics, pp. 82-96. [12] Almesaeed R., andAl-Salem E., 2022. Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks. Wireless Networks,28(4), pp. 1361-1374. |