“…ese devices can be silent attackers that use the system's weak defence to launch attacks. e authors considered this area of research in [13], where they proposed a blockchain-based access control for mitigating rogue devices in IoT. e authors aimed at removing the centralised mode of detection by replacing architecture with the blockchain, which offers secure device registration using smart contracts.…”