<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Научно-аналитический журнал &quot;Вестник Санкт-Петербургского университета ГПС МЧС России&quot;</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="online">2218-130X</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">105609</article-id>
   <article-id pub-id-type="doi">10.61260/2218-130X-2025-3-30-41</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>INFORMATICS, COMPUTER ENGINEERING AND CONTROL</subject>
    </subj-group>
    <subj-group>
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">MODELING AND ANALYSIS OF SECURE SELF-ORGANIZED WIRELESS SENSOR NETWORKS</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>МОДЕЛИРОВАНИЕ И АНАЛИЗ ЗАЩИЩЕННЫХ САМООРГАНИЗУЮЩИХСЯ БЕСПРОВОДНЫХ СЕНСОРНЫХ СЕТЕЙ</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-3748-5414</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Десницкий</surname>
       <given-names>Василий Алексеевич</given-names>
      </name>
      <name xml:lang="en">
       <surname>Desnitsky</surname>
       <given-names>Vasily A.</given-names>
      </name>
     </name-alternatives>
     <email>desnitsky@comsec.spb.ru</email>
     <bio xml:lang="ru">
      <p>кандидат технических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of technical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Российская академия наук</institution>
     <city>Санкт-Петербург</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Russian Academy of Sciences</institution>
     <city>Saint-Petersburg</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2025-10-21T00:00:00+03:00">
    <day>21</day>
    <month>10</month>
    <year>2025</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2025-10-21T00:00:00+03:00">
    <day>21</day>
    <month>10</month>
    <year>2025</year>
   </pub-date>
   <volume>2025</volume>
   <issue>3</issue>
   <fpage>30</fpage>
   <lpage>41</lpage>
   <history>
    <date date-type="received" iso-8601-date="2025-08-05T00:00:00+03:00">
     <day>05</day>
     <month>08</month>
     <year>2025</year>
    </date>
    <date date-type="accepted" iso-8601-date="2025-08-28T00:00:00+03:00">
     <day>28</day>
     <month>08</month>
     <year>2025</year>
    </date>
   </history>
   <self-uri xlink:href="https://journals.igps.ru/en/nauka/article/105609/view">https://journals.igps.ru/en/nauka/article/105609/view</self-uri>
   <abstract xml:lang="ru">
    <p>В связи с развитием и совершенствованием беспроводных сенсорных сетей и их распространением в различных практических областях возникает потребность в большем динамизме и изменчивости таких сетей. Наблюдается все возрастающая тенденция к повышению самоорганизуемости и децентрализации таких сетей, и такие сети становятся более настраиваемыми под нужды конкретного потребителя и адаптивными в зависимости от текущих условий функционирования. Появляются и совершенствуются протоколы распределенного управления такими сетями со все большим внедрением сетей с ячеистой токологией (mesh-сетей). В рамках таких сетей узлы могут менять свое географическое положение, выстраивать новые коммуникационные каналы в зависимости от текущей пропускной способности и надежности соединения, выполнять различные служебные и прикладные функции. Однако, такое развитие беспроводных сенсорных сетей формирует новые угрозы информационной безопасности, непосредственно связанные со злонамеренной эксплуатацией свойств самоорганизации и децентрализации. Потенциальный атакующий оказывается способным осуществлять атаки подмены и модификации данных от сенсоров, flooding-воздействия, атаки истощения энергоресурсов, атаки нарушения процессов маршрутизации в сети и др. с большей вариативностью и потенциально более высоким эффектом. Настоящая работа ориентирована на моделирование и анализ такого вида атак, и основной акцент сделан на исследование возможностей имитационного моделирования с учетом влияния свойств самоорганизации и децентрализации сетей и атак, эксплуатирующих эти свойства. В статье предлагается подход к имитационному моделированию самоорганизующихся беспроводных сенсорных сетей с ролевым управлением. Проведенные эксперименты на модели фрагмента беспроводных сенсорных сетей для системы взаимосвязанных беспилотных летательных аппаратов подтверждают корректность данного подхода и его выполнимость на практике.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>Due to the development and improvement of wireless sensor networks and their active implementation in various areas, there is a need to increase the dynamics and variability of such networks. Today, there is a clear trend towards an increase in the level of self-organization and decentralization, due to which networks adapt to user needs and operating conditions. &#13;
For this purpose, distributed control protocols are created and improved, networks with a cellular topology (mesh networks) are actively introduced. Nodes of such networks are able to move, create new data transmission paths based on the current state of communication channels and device resources, and perform various auxiliary and applied tasks. However, the progress of wireless sensor networks gives rise to additional information security risks associated with the use of self-organization and decentralization features by intruders. Attacks on such infrastructure include manipulation of sensor data, flood attacks that deplete equipment resources, failures in signal transmission routes, and other impacts that are characterized by increased variability and efficiency. This article comprises modeling and studying this type of threats, with special attention paid to simulation analysis methods taking into account the specificity properties of self-organization and decentralization of networks and attacks that exploit them. The proposed approach is built on role-based management in the simulation modeling of self-organizing wireless sensor networks. The results of experiments on a model of a network fragment for a group of connected unmanned aerial vehicles confirmed the validity and practicality of the proposed method.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>беспроводная сенсорная сеть</kwd>
    <kwd>моделирование</kwd>
    <kwd>безопасность</kwd>
    <kwd>атака</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>wireless sensor network</kwd>
    <kwd>modeling</kwd>
    <kwd>security</kwd>
    <kwd>attack</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Li N., Liu X. Research on Self-Organization and Adaptive Strategy of the Internet of Things Sensor Networks // IEEE Access. 2024. Vol. 12. P. 66569–66579. DOI: 10.1109/ACCESS.2024.3399537.</mixed-citation>
     <mixed-citation xml:lang="en">Li N., Liu X. Research on Self-Organization and Adaptive Strategy of the Internet of Things Sensor Networks // IEEE Access. 2024. Vol. 12. P. 66569–66579. DOI: 10.1109/ACCESS.2024.3399537.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Aldawsari H. A blockchain-based approach for secure energy-efficient IoT-based Wireless Sensor Networks for smart cities // Alexandria Engineering Journal. 2025. Vol. 126. P. 1–7. DOI: 10.1016/j.aej.2025.04.052.</mixed-citation>
     <mixed-citation xml:lang="en">Aldawsari H. A blockchain-based approach for secure energy-efficient IoT-based Wireless Sensor Networks for smart cities // Alexandria Engineering Journal. 2025. Vol. 126. P. 1–7. DOI: 10.1016/j.aej.2025.04.052.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Sultanow E., Chircu A. A Review of IoT Technologies, Standards, Tools, Frameworks and Platforms // The Internet of Things in the Industrial Sector: Security and Device Connectivity, Smart Environments, and Industry 4.0. 2019. P. 3–34. DOI: 10.1007/978-3-030-24892-5_1.</mixed-citation>
     <mixed-citation xml:lang="en">Sultanow E., Chircu A. A Review of IoT Technologies, Standards, Tools, Frameworks and Platforms // The Internet of Things in the Industrial Sector: Security and Device Connectivity, Smart Environments, and Industry 4.0. 2019. P. 3–34. DOI: 10.1007/978-3-030-24892-5_1.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Forensic Analysis of the Xiaomi Mi Smart Sensor Set / J.M. Castelo Gómez [et al.] // Forensic Science International: Digital Investigation. 2022. Vol. 42–43. P. 301451. DOI: 10.1016/j.fsidi.2022.301451.</mixed-citation>
     <mixed-citation xml:lang="en">Forensic Analysis of the Xiaomi Mi Smart Sensor Set / J.M. Castelo Gómez [et al.] // Forensic Science International: Digital Investigation. 2022. Vol. 42–43. P. 301451. DOI: 10.1016/j.fsidi.2022.301451.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Abdalzaher M.S., Fouda M.M., Ibrahem M.I. Data Privacy Preservation and Security in Smart Metering Systems // Energies. 2022. Vol. 15. № 19. P. 7419. DOI: 10.3390/en15197419.</mixed-citation>
     <mixed-citation xml:lang="en">Abdalzaher M.S., Fouda M.M., Ibrahem M.I. Data Privacy Preservation and Security in Smart Metering Systems // Energies. 2022. Vol. 15. № 19. P. 7419. DOI: 10.3390/en15197419.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Sharma R. Enhancing Industrial Automation and Safety Through Real-Time Monitoring and Control Systems // International Journal on Smart &amp; Sustainable Intelligent Computing. 2024. Vol. 1. № 2. P. 1–20. DOI: 10.63503/j.ijssic.2024.30.</mixed-citation>
     <mixed-citation xml:lang="en">Sharma R. Enhancing Industrial Automation and Safety Through Real-Time Monitoring and Control Systems // International Journal on Smart &amp; Sustainable Intelligent Computing. 2024. Vol. 1. № 2. P. 1–20. DOI: 10.63503/j.ijssic.2024.30.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Data Communication for Wireless Mobile Nodes in Intelligent Transportation Systems / K.N. Qureshi [et al.] // Microprocessors and Microsystems. 2022. Vol. 90. P. 104501. DOI: 10.1016/j.micpro.2022.104501.</mixed-citation>
     <mixed-citation xml:lang="en">Data Communication for Wireless Mobile Nodes in Intelligent Transportation Systems / K.N. Qureshi [et al.] // Microprocessors and Microsystems. 2022. Vol. 90. P. 104501. DOI: 10.1016/j.micpro.2022.104501.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Mills K. A Brief Survey of Self-Organization in Wireless Sensor Networks: Research Articles // Wireless Communications and Mobile Computing. 2007. Vol. 7. P. 823–834. DOI: 10.1002/wcm.499.</mixed-citation>
     <mixed-citation xml:lang="en">Mills K. A Brief Survey of Self-Organization in Wireless Sensor Networks: Research Articles // Wireless Communications and Mobile Computing. 2007. Vol. 7. P. 823–834. DOI: 10.1002/wcm.499.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Khanna R. Evolutionary Approach to Efficient Provisioning and Self-organization in Wireless Sensor Networks (WSN). Oregon State University, 2016.</mixed-citation>
     <mixed-citation xml:lang="en">Khanna R. Evolutionary Approach to Efficient Provisioning and Self-organization in Wireless Sensor Networks (WSN). Oregon State University, 2016.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Improving Security in WMNs With Reputation Systems and Self-Organizing Maps / Z. Bankovic [et al.] // Journal of Network and Computer Applications. 2011. Vol. 34. Iss. 2. P. 455–463. DOI: 10.1016/j.jnca.2010.03.023.</mixed-citation>
     <mixed-citation xml:lang="en">Improving Security in WMNs With Reputation Systems and Self-Organizing Maps / Z. Bankovic [et al.] // Journal of Network and Computer Applications. 2011. Vol. 34. Iss. 2. P. 455–463. DOI: 10.1016/j.jnca.2010.03.023.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Decentralized Intrusion Detection in Wireless Sensor Networks / A.P. Silva [et al.] // Proceedings. 2005. P. 16–23. DOI: 10.1145/1089761.1089765.</mixed-citation>
     <mixed-citation xml:lang="en">Decentralized Intrusion Detection in Wireless Sensor Networks / A.P. Silva [et al.] // Proceedings. 2005. P. 16–23. DOI: 10.1145/1089761.1089765.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Chatzigiannakis I., Strikos A. A Decentralized Intrusion Detection System for Increasing Security of Wireless Sensor Networks // 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007), Patras, Greece. 2007. P. 1408–1411. DOI: 10.1109/EFTA.2007.4416949.</mixed-citation>
     <mixed-citation xml:lang="en">Chatzigiannakis I., Strikos A. A Decentralized Intrusion Detection System for Increasing Security of Wireless Sensor Networks // 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007), Patras, Greece. 2007. P. 1408–1411. DOI: 10.1109/EFTA.2007.4416949.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Blockchain-powered defense: Securing WSN against DDoS attacks with decentralized authentication / A. Suman [et al.] // Wireless Ad-hoc and Sensor Networks. CRC Press. 2024. P. 318–339.</mixed-citation>
     <mixed-citation xml:lang="en">Blockchain-powered defense: Securing WSN against DDoS attacks with decentralized authentication / A. Suman [et al.] // Wireless Ad-hoc and Sensor Networks. CRC Press. 2024. P. 318–339.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Lee C., Suzuki J. SWAT: A Decentralized Self-Healing Mechanism for Wormhole Attacks in Wireless Sensor Networks // Handbook on Sensor Networks. World Scientific Publishing Co., 2010. P. 511–532. DOI: 10.1142/9789812837318_0021.</mixed-citation>
     <mixed-citation xml:lang="en">Lee C., Suzuki J. SWAT: A Decentralized Self-Healing Mechanism for Wormhole Attacks in Wireless Sensor Networks // Handbook on Sensor Networks. World Scientific Publishing Co., 2010. P. 511–532. DOI: 10.1142/9789812837318_0021.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Energy Optimized Security Against Wormhole Attack in IoT-Based Wireless Sensor Networks / H. Shahid [et al.] // Computers, Materials and Continua. 2021. Vol. 68. Iss. 2. P. 1967–1981. DOI: 10.32604/cmc.2021.015259.</mixed-citation>
     <mixed-citation xml:lang="en">Energy Optimized Security Against Wormhole Attack in IoT-Based Wireless Sensor Networks / H. Shahid [et al.] // Computers, Materials and Continua. 2021. Vol. 68. Iss. 2. P. 1967–1981. DOI: 10.32604/cmc.2021.015259.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Wormhole Attack Mitigation Strategies and Their Impact on Wireless Sensor Network Performance: A Literature Survey / H. Shahid [et al.] // International Journal of Communication Systems. 2022. Vol. 35. DOI: 10.1002/dac.5311.</mixed-citation>
     <mixed-citation xml:lang="en">Wormhole Attack Mitigation Strategies and Their Impact on Wireless Sensor Network Performance: A Literature Survey / H. Shahid [et al.] // International Journal of Communication Systems. 2022. Vol. 35. DOI: 10.1002/dac.5311.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">An Efficient Intrusion Detection Framework for Mitigating Blackhole and Sinkhole Attacks in Healthcare Wireless Sensor Networks / J.L. Webber [et al.] // Computers and Electrical Engineering. 2023. Vol. 111, Part B. P. 108964. DOI: 10.1016/j.compeleceng.2023.108964.</mixed-citation>
     <mixed-citation xml:lang="en">An Efficient Intrusion Detection Framework for Mitigating Blackhole and Sinkhole Attacks in Healthcare Wireless Sensor Networks / J.L. Webber [et al.] // Computers and Electrical Engineering. 2023. Vol. 111, Part B. P. 108964. DOI: 10.1016/j.compeleceng.2023.108964.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Detection of Hello Flood Attacks Using Fuzzy-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks / S. Radhika [et al.] // Electronics. 2023. Vol. 12. № 1. P. 123. DOI: 10.3390/electronics12010123.</mixed-citation>
     <mixed-citation xml:lang="en">Detection of Hello Flood Attacks Using Fuzzy-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks / S. Radhika [et al.] // Electronics. 2023. Vol. 12. № 1. P. 123. DOI: 10.3390/electronics12010123.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Arunachalam R., Ruby Kanmani E.D. Detection and Mitigation of Vampire Attacks with Secure Routing in WSN Using Weighted RNN and Optimal Path Selection // Computers &amp; Security. 2024. Vol. 145. P. 103991. DOI: 10.1016/j.cose.2024.103991.</mixed-citation>
     <mixed-citation xml:lang="en">Arunachalam R., Ruby Kanmani E.D. Detection and Mitigation of Vampire Attacks with Secure Routing in WSN Using Weighted RNN and Optimal Path Selection // Computers &amp; Security. 2024. Vol. 145. P. 103991. DOI: 10.1016/j.cose.2024.103991.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Almesaeed R., Al-Salem E. Sybil Attack Detection Scheme Based on Channel Profile and Power Regulations in Wireless Sensor Networks // Wireless Networks. 2022. Vol. 28. P. 1361–1374. DOI: 10.1007/s11276-021-02871-0.</mixed-citation>
     <mixed-citation xml:lang="en">Almesaeed R., Al-Salem E. Sybil Attack Detection Scheme Based on Channel Profile and Power Regulations in Wireless Sensor Networks // Wireless Networks. 2022. Vol. 28. P. 1361–1374. DOI: 10.1007/s11276-021-02871-0.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Nayyar A., Singh R. A Comprehensive Review of Simulation Tools for Wireless Sensor Networks (WSNs) // Journal of Wireless Networking and Communications. 2015. Vol. 5. № 1. P. 19–47. DOI: 10.5923/j.jwnc.20150501.03.</mixed-citation>
     <mixed-citation xml:lang="en">Nayyar A., Singh R. A Comprehensive Review of Simulation Tools for Wireless Sensor Networks (WSNs) // Journal of Wireless Networking and Communications. 2015. Vol. 5. № 1. P. 19–47. DOI: 10.5923/j.jwnc.20150501.03.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey / G.H. Adday [et al.] // IEEE Access. 2024. Vol. 12. P. 22938–22977. DOI: 10.1109/ACCESS.2024.3362889.</mixed-citation>
     <mixed-citation xml:lang="en">Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey / G.H. Adday [et al.] // IEEE Access. 2024. Vol. 12. P. 22938–22977. DOI: 10.1109/ACCESS.2024.3362889.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">A Secure Framework for Data Sharing in Private Blockchain-Based WBANs / L. Xiao [et al.] // IEEE Access. 2020. Vol. 8. P. 153956–153968. DOI: 10.1109/ACCESS.2020.3018119.</mixed-citation>
     <mixed-citation xml:lang="en">A Secure Framework for Data Sharing in Private Blockchain-Based WBANs / L. Xiao [et al.] // IEEE Access. 2020. Vol. 8. P. 153956–153968. DOI: 10.1109/ACCESS.2020.3018119.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
