RetractedArticlePublisher preview available

Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expected performance. Towards performance hike, a novel trust aware localized routing and class based dynamic encryption scheme has been presented. The method first discovers the route to reach the destination and transmit the data packet. But the localized nature of each hop in the route estimates the trust measure for each neighbor according to their prior involvement in data transmission and number of retransmission of the same packets with other neighbor, number of successful transmission. By identifying the values of those parameters, the value of trusted data forwarding support (TDFS) is measured. According to the TDFS value of several routes, a route with the specific neighbor only selected for route selection. On the other side, the method maintains and classifies the data being transmitting into number of classes. Further, the method uses different signature and encryption schemes for various classes. The data has been encrypted with class specific scheme and key before transmission. The method generates a block chain where each block contains the part of encrypted data and represented by a hash and pointer to the next block. The same has been reversed to produce original data from the encrypted key. The method introduces higher performance data security and improves the overall network performance.
This content is subject to copyright. Terms and conditions apply.
Vol.:(0123456789)
1 3
Journal of Ambient Intelligence and Humanized Computing (2021) 12:5287–5295
https://doi.org/10.1007/s12652-020-02007-w
ORIGINAL RESEARCH
Trust aware localized routing andclass based dynamic block chain
encryption scheme forimproved security inWSN
M.HemaKumar1· V.Mohanraj2· Y.Suresh2· J.Senthilkumar2· G.Nagalalli3
Received: 7 January 2020 / Accepted: 17 April 2020 / Published online: 30 April 2020
© Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract
The modern wireless sensor network has great impact in the development of various domains of applications. The pres-
ence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been
proposed towards the data security but not achieved the expected performance. Towards performance hike, a novel trust
aware localized routing and class based dynamic encryption scheme has been presented. The method first discovers the
route to reach the destination and transmit the data packet. But the localized nature of each hop in the route estimates the
trust measure for each neighbor according to their prior involvement in data transmission and number of retransmission of
the same packets with other neighbor, number of successful transmission. By identifying the values of those parameters, the
value of trusted data forwarding support (TDFS) is measured. According to the TDFS value of several routes, a route with
the specific neighbor only selected for route selection. On the other side, the method maintains and classifies the data being
transmitting into number of classes. Further, the method uses different signature and encryption schemes for various classes.
The data has been encrypted with class specific scheme and key before transmission. The method generates a block chain
where each block contains the part of encrypted data and represented by a hash and pointer to the next block. The same has
been reversed to produce original data from the encrypted key. The method introduces higher performance data security and
improves the overall network performance.
Keywords WSN· Data security· Secure routing· Block chain· TDFS· Trust aware routing
1 Introduction
The wireless sensor network (WSN) is the most domi-
nant network in use now a days. However, the sensors of
WSN come with limited energy and transmission range
which force them to perform cooperative transmission
with the help of number of intermediate sensor nodes.
As like any other network, the WSN also subjective to
face number of threats performed by adversaries. In gen-
eral, the data transmission is performed by discovering the
routes between any two nodes which are geographically
located away. The route discovery is performed by broad-
cast mechanism and the route selection may be performed
by any protocol like shortest path, energy efficient routing
and so on.
The threat in WSN is identified in two ways one in
the routing another in data. The routing attacks are per-
formed by choosing an unsuitable route towards the proto-
col enforced. For example, if the routing protocol should
choose an energy efficient route, then the malicious node
* M. Hema Kumar
hemakumarmohan@gmail.com
V. Mohanraj
vmohanraj06@gmail.com
Y. Suresh
ysuresh33@gmail.com
J. Senthilkumar
jsenthil10@gmail.com
G. Nagalalli
nagalalli87@gmail.com
1 Department ofBiomedical Engineering, Mahendra Institute
ofTechnology, Namakkal, Tamilnadu, India
2 Department ofInformation Technology, Sona College
ofTechnology, Salem, Tamilnadu, India
3 Department ofElectronics andCommunication Engineering,
Sona College ofTechnology, Salem, Tamilnadu, India
RETRACTED ARTICLE
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
... However, data storage over the blockchain is costly as compared to other centralized storage platforms. In [14], trust aware localized routing is performed to find the secure route. Also, a blockchain-based authentication mechanism is proposed. ...
... L4: long paths deplete nodes' energy [14]. ...
... L5: registration consumes more gas due to hybrid blockchain [14]. ...
Article
Full-text available
In this paper, a blockchain based secure routing model is proposed for the Internet of Sensor Things (IoSTs). The blockchain is used to register the nodes and store the data packets' transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overhead incurred due to the use of Proof of Work (PoW) consensus mechanism. Furthermore, during routing of data packets, malicious nodes can exist in the IoSTs network, which eavesdrop the communication. Therefore, the Genetic Algorithm based Support Vector Machine (GA-SVM) and Genetic Algorithm based Decision Tree (GA-DT) models are proposed for malicious node detection. After the malicious node detection, Dijkstra algorithm is used to find the optimal routing path in the network. The simulation results show the effectiveness of the proposed model. PoA is compared with PoW in terms of the transaction cost in which PoA has consumed 30% less cost than PoW. Furthermore, without Man In The Middle (MITM) attack, GA-SVM consumes 10% less energy than with MITM attack. Moreover, without any attack, GA-SVM consumes 30% less than grayhole attack and 60% less energy than mistreatment. The results of Decision Tree (DT), Support Vector Machine (SVM), GA-DT and GA-SVM are compared in terms of accuracy and precision. The accuracy of DT, SVM, GA-DT and GA-SVM is 88%, 93%, 96% and 98%, respectively. The precision of DT, SVM, GA-DT and GA-SVM is 100%, 92%, 94% and 96%, respectively. In addition, the Dijkstra algorithm is compared with Bellman Ford algorithm. The shortest distances calculated by Dijkstra and Bellman are 8 and 11 hops long, respectively. Also, security analysis is performed to check the smart contract's effectiveness against attacks. Moreover, we induced three attacks: grayhole attack, mistreatment attack and MITM attack to check the resilience of our proposed system model.
... Secondly, the authors present a security model that improves the network reliability based on blockchain. Furthermore, the authors in [29] propose a blockchain based encryption and localized routing scheme to discover a route. Moreover, blockchain technology is used for data security that separates the data into blocks. ...
... A routing algorithm for the WSN to find the secure route is proposed. However, the authors do not consider the malicious nodes' detection and authentication [29]. The malicious nodes forge the actual identities of the benign nodes and drop the packets that result in a low Packet Delivery Ratio (PDR). ...
Article
In this paper, an encryption and trust evaluation model is proposed on the basis of blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) are stored. The authentication of ANs and SNs is performed in public and private blockchains, respectively. However, inauthentic nodes utilize the network's resources and perform malicious activities. Moreover, the SNs have limited energy, transmission range and computational capabilities, and are attacked by malicious nodes. Afterwards, the malicious nodes transmit wrong information of the route and increase the number of retransmissions due to which SN's energy is rapidly consumed. The lifespan of the wireless sensor network is reduced due to the rapid energy dissipation of the SNs. Furthermore, the throughput increases and packet loss increase with the presence of malicious nodes in the network. The trust values of SNs are computed to eradicate the malicious nodes from the network. Secure routing in the network is performed considering residual energy and trust values of the SNs. Moreover, the Rivest-Shamir-Adleman (RSA), a cryptosystem that provides asymmetric key, is used for securing data transmission. The simulation results show the effectiveness of the proposed model in terms of high packet delivery ratio.
... The feedback based routing protocols are proposed by existing schemes, which increase the overall routing overheads due to feedback packets. Moreover, re-transmissions due to packet drop result in high energy consumption of nodes [33]. The attackers can easily compromise the IoT and the WSNs due to deployment in a harsh environment, which affects the routing process. ...
... Afterwards, the policies are made by synchronizing the cloud's models with SDN controllers in fog layer. Kumar et al. [33] propose a trust aware localized routing mechanism using blockchain enabled dynamic class based encryption scheme. The selection of routes is made based on the trust value. ...
Article
nternet of Things (IoT) is an emerging domain in which different devices communicate with each other through minimum human intervention. IoT devices are usually operated in hostile and unattended environments. Moreover, routing in current IoT architecture becomes inefficient due to malicious and unauthenticated nodes' existence, minimum network lifetime, insecure routing, etc. This paper proposes a lightweight blockchain based authentication mechanism where ordinary sensors' credentials are stored. As IoT nodes have a short lifespan due to energy depletion, few credentials are stored in the blockchain to achieve lightweight authentication. Moreover, the route calculation is performed by a genetic algorithm enabled software defined network controller, which is also used for on-demand routing to optimize the energy consumption of the nodes in the IoT network. Furthermore, a route correctness mechanism is proposed to check the existence of malicious nodes in the calculated route. Moreover, a detection mechanism is proposed to restrict the malicious nodes' activities, while a malicious node's list is maintained in the blockchain, which is used in the route correctness mechanism. The proposed model is evaluated by performing intensive simulations. The effectiveness of the proposed model is depicted in terms of gas consumption, which shows the optimized utilization of resources. The residual energy of the network shows optimized route calculation, while the malicious node detection method shows the number of packets dropped.nternet of Things (IoT) is an emerging domain in which different devices communicate with each other through minimum human intervention. IoT devices are usually operated in hostile and unattended environments. Moreover, routing in current IoT architecture becomes inefficient due to malicious and unauthenticated nodes' existence, minimum network lifetime, insecure routing, etc. This paper proposes a lightweight blockchain based authentication mechanism where ordinary sensors' credentials are stored. As IoT nodes have a short lifespan due to energy depletion, few credentials are stored in the blockchain to achieve lightweight authentication. Moreover, the route calculation is performed by a genetic algorithm enabled software defined network controller, which is also used for on-demand routing to optimize the energy consumption of the nodes in the IoT network. Furthermore, a route correctness mechanism is proposed to check the existence of malicious nodes in the calculated route. Moreover, a detection mechanism is proposed to restrict the malicious nodes' activities, while a malicious node's list is maintained in the blockchain, which is used in the route correctness mechanism. The proposed model is evaluated by performing intensive simulations. The effectiveness of the proposed model is depicted in terms of gas consumption, which shows the optimized utilization of resources. The residual energy of the network shows optimized route calculation, while the malicious node detection method shows the number of packets dropped.I
... The feedback based routing protocols are proposed by existing schemes, which increase the overall routing overheads due to feedback packets. Moreover, re-transmissions due to packet drop result in high energy consumption of nodes [33]. The attackers can easily compromise the IoT and the WSNs due to deployment in a harsh environment, which affects the routing process. ...
... Afterwards, the policies are made by synchronizing the cloud's models with SDN controllers in fog layer. Kumar et al. [33] propose a trust aware localized routing mechanism using blockchain enabled dynamic class based encryption scheme. The selection of routes is made based on the trust value. ...
Article
Full-text available
Internet of Things (IoT) is an emerging domain in which different devices communicate with each other through minimum human intervention. IoT devices are usually operated in hostile and unattended environments. Moreover, routing in current IoT architecture becomes inefficient due to malicious and unauthenticated nodes' existence, minimum network lifetime, insecure routing, etc. This paper proposes a lightweight blockchain based authentication mechanism where ordinary sensors' credentials are stored. As IoT nodes have a short lifespan due to energy depletion, few credentials are stored in the blockchain to achieve lightweight authentication. Moreover, the route calculation is performed by a genetic algorithm enabled software defined network controller, which is also used for on-demand routing to optimize the energy consumption of the nodes in the IoT network. Furthermore, a route correctness mechanism is proposed to check the existence of malicious nodes in the calculated route. Moreover, a detection mechanism is proposed to restrict the malicious nodes' activities, while a malicious node's list is maintained in the blockchain, which is used in the route correctness mechanism. The proposed model is evaluated by performing intensive simulations. The effectiveness of the proposed model is depicted in terms of gas consumption, which shows the optimized utilization of resources. The residual energy of the network shows optimized route calculation, while the malicious node detection method shows the number of packets dropped.
... e network layer mainly includes various protocols used in the block chain network. ese include the P2P network protocol for building block chain, the communication protocol for transaction broadcasting, and the verification protocol for transaction verification before submitting data to the ledger [18]. ...
Article
Full-text available
At present, the government and universities mainly adopted the centralized management mode in the sharing of asset digital resources, which not only had low work efficiency, but also cannot make full use of resources. Block chain technology played an important role in enterprise asset data resource data sharing, but there was less research on asset data sharing services applied to digital government and universities. Therefore, this paper proposed the research on the path of government and university asset value-added service driven by block chain technology, in order to provide reference for improving the utilization rate of state-owned assets and better meeting the needs of users. Based on the research on the problems existing in the digital resource management of relevant government agencies and university departments at home and abroad, combined with the application advantages of block chain technology in relevant fields, this paper analyzed the composition of block chain and the application technical characteristics of value-added services. Starting from the current situation of asset data information management by the government and universities and the needs of users for resources, this paper expounded the important impact of block chain technology on digital government and university asset information management. By analyzing the elements of block chain value-added service, this paper put forward the block chain-driven asset intelligent value-added service mode. In order to track and manage users’ transaction information and meet users’ demand for resources, the application path of asset intelligent value-added service driven by block chain technology was constructed based on the asset value-added service mode, and combined with the characteristics of users’ request for resources, the implementation method of asset intelligent value-added service path was proposed. The experimental results showed that the method proposed in this paper had more advantages than the existing data sharing service system, and can effectively provide technical support for asset value-added services.
... Besides, the procedures in view of convention activity can be arranged into various methods, be specific rational based, multipath-based, exchange based, question based, and QoS based routing strategies. The proactive conventions figure the courses ahead of time before they are really required, while the responsive convention registers the courses on an on-request premise [9]. Customary routing conventions communicate the traffic alongside the foreordained ways, which starts intricacies with untrustworthy remote medium [10]. ...
Article
Full-text available
The province of wireless sensor network (WSN) is increasing continuously because of wide-ranging applications, namely, monitoring environmental conditions, military, and many other fields. But trust management in the WSN is the main objective as trust was utilized once cooperation among nodes becomes crucial to attaining reliable transmission. Thus, a new trust-based routing protocol is introduced to initiate secure routing. This study focuses on the design of Trust Aware Aquila Optimizer based Secure Data Transmission for Information Management (TAAO-SDTIM) in WSN. The presented TAAO-SDTIM model mainly intends to achieve maximum security and information management in WSN. The presented TAAO-SDTIM model determines optimum set of routes to base station (BS) utilizing a fitness function involving three parameters like residual energy (RE), distance to BS (DBS), and trust level (TL). The incorporation of the trust level of the nodes in the route selection process aids in appropriately selecting highly secure nodes in the data transmission procedure. For ensuring the enhanced performance of the TAAO-SDTIM model, a wide range of experiments are executed and the results pointed out the improved outcomes of the TAAO-SDTIM model over the other recent approaches.
... Many solutions are provided for data security and to select a suitable route from source to destination on the basis of an energy-efficient path. However, these solutions incur extra overhead and do not provide efficient path selection [15]. The authors in [16] highlight the same issue that there is no routing scheme to identify the malicious routing nodes that affect the data integrity and path selection mechanism. ...
Article
In this paper, a blockchained Beyond Fifth Generation (B5G) enabled malicious node detection model is proposed for the Internet of Sensor Things (IoSTs). Moreover, a secure service provisioning scheme using cascading encryption and feature evaluation process is also proposed for the IoSTs. The presence of malicious nodes causes severe issues in the localization and service provisioning, which discourages new entities to join the network. Therefore, it is very important to establish trust between all entities by detecting and removing such nodes. The proposed B5G enabled malicious node detection model uses federated learning for the detection of malicious nodes. The federated learning uses Support Vector Machine (SVM) and Random Forest (RF) classifiers to detect the malicious nodes. The malicious nodes are classified on the bases of their honesty and end-to-end delay. Moreover, the service provider nodes provide services to each other and get the reward. However, the service provisioning in the IoSTs has many issues like a repudiation of service providers as well as the clients. The feature evaluation and cascading encryption mechanisms are used to solve these issues. The digital signature in cascading encryption ensures the non-repudiation of the service provider. On the other hand, feature evaluation of service ensures that the client can not repudiate about actually demanded services. Moreover, the conformance of services is also ensured by the feature evaluation process. The simulation results show the effectiveness of our proposed non-repudiation model. The SVM and RF classifiers are compared in terms of accuracy, precision, F1 score and recall. The accuracy, precision, F1 score and recall of SVM are 79%, 1, 0.8795 and 0.78, respectively. On the other hand, the accuracy, precision, F1 score and recall of RF classifier are 95%, 0.92, 0.96 and 1, respectively. The results show that RF has better accuracy than RF in malicious nodes detection.
... If there are selfish nodes in the routing, as a result the throughput of the network decreases. The energy of a sensor node dissipates on checking route and updating the routing table on each request [29]. In [30], the authors propose a secure scheduling mechanism of charging using blockchain. ...
Thesis
Full-text available
In this thesis, the blockchain and smart contracts are used to provide registration, mutual authentication, data sharing and fair nonrepudiation in wireless sensor network. The proposed model consists of three types of nodes: coordinators, cluster heads and sensor nodes. A consortium blockchain is deployed on coordinator nodes. The smart contracts execute on coordinators to record the identities of legitimate nodes. Moreover, they authenticate nodes and facilitate in data sharing and arbitration in case of repudiation. When a sensor node communicates and access data of any other sensor node, both nodes mutually authenticate each other. The smart contract of data sharing and nonrepudiation is used to provide a secure communication and data exchange between sensor nodes. Moreover, it records the evidences during the data exchange. When the exchanged data is found illegitimate or the requesting sensor node denies the legitimacy of data, then an arbitration smart contract resolves the dispute on the basis of evidences and punishes the sensor node accordingly. Additionally, the data of all the nodes is stored on the decentralized storage called interplanetary file system. Moreover, the staller consensus protocol is used in the proposed model to increase the efficiency and transaction throughput. The transaction latency of the proposed system model is approximately 81.82% lower than the proof of work based model. Moreover, the gas consumption of the data request and data provisioning is economical.
Article
The Internet of Medical Things (IoMT) is a definite IoT connecting atmosphere that contracts with communication via intelligent medical equipment. Activity detection, motion tracking, information extraction, consumer retrieval, etc., have all been solved due to advances in the autonomous study of human behavior from multimedia information processing. Though the IoT connecting atmosphere enables and provisions our daily actions, it too has certain disadvantages. IoTgrieves from numerous safety and confidentiality challenges, such as reiteration, impersonation, man-in-the-middle, remote hijacking, privileged-insider attack, denial of service (DoS) attacks, password guessing, and malware bouts. Hence, in this paper, Private Blockchain and Fuzzy Logic based Attack Detection system (PBFL-ADS) has been proposed for secure IoMT disease prediction using Multimedia Information Processing techniques. The proposed method utilizes Bayesian inference-based trust administration to perceived malevolent nodes in Health Smartphone Structures (HSS) for PBFL-ADS. This paper focuses on the specific form of IoMT called HSS because smartphones have been widely used in the healthcare profession. Then, blockchains have been utilized to improve Bayesian trust management's efficacy in detecting hostile nodes in HSSs. The effectiveness of the suggested technique has been assessed, and test results show that blockchain technology helps identify fraudulent nodes with an acceptable workload. The proposed PBFL-ADS method increases the HS2 scenario 1.1, processor utilization at nodes 33.5%, pattern recognition ratio 92.1%.and server utilization 40.1%.
Article
This paper proposes a blockchain based nodes' authentication model for the internet of sensor things (IoST). The nodes in the network are authenticated based on their credentials to make the network free from malicious nodes. In IoST, sensor nodes gather the information from the environment and send it to the cluster heads (CHs) for additional processing. CHs aggregate the sensed information. Therefore, their energy rapidly depletes due to extra workload. To solve this issue, we proposed distance, degree, and residual energy based low-energy adaptive clustering hierarchy (DDR-LEACH) protocol. DDR-LEACH is used to replace CHs with the ordinary nodes based on maximum residual energy, degree and minimum distance from BS. Furthermore, storing a huge amount of data in the blockchain is very costly. To tackle this issue, an external data storage, named as interplanetary file system (IPFS), is used. Furthermore, for ensuring data security in IPFS, AES 128-bit is used, which performs better than the existing encryption schemes. Moreover, a huge computational cost is required using a proof of work consensus mechanism to validate transactions. To solve this issue, proof of authority (PoA) consensus mechanism is used in the proposed model. The simulation results are carried out, which show the efficiency and effectiveness of the proposed system model. The DDR-LEACH is compared with LEACH and the simulation results show that DDR-LEACH outperforms LEACH in terms of energy consumption, throughput and improvement in network lifetime with CH selection mechanism. Moreover, transaction cost is computed, which is reduced by PoA during data storage on IPFS and service provisioning. Furthermore, the time is calculated in the comparison of AES 128-bit scheme with existing scheme. The formal security analysis is performed to check the effectiveness of smart contract against attacks. Also, two different attacks, MITM and Sybil, are induced in our system to show our system model's resilience against cyber attacks.
Article
Full-text available
The development of Electronic Information Technology has made the Electronic Medical Record a commonly used approach to recording and categorizing medical patient data in databases of different hospitals and medical entities so that controlling the shared data is not possible for patients at all. The importance of medical data as possessions of people and the system leads us to be concerned about its security, privacy, and accessibility. How to store and controlling access to medical information is of the most important challenges in the electronic health area. The present paper provides a new, secure, and efficient scheme based on blockchain technology and attribute-based encryption entitled “MedSBA” to record and store medical data, indicating that our proposed scheme protects user privacy and allows fine-grain access control of medical patient data based on General Data Protection Regulation (GDPR). Private blockchains are used in MedSBA to improve the right to revoke instant access which is of the attribute-based encryption challenges. The security and functionality of our proposed scheme are proved within a formal model and based on BAN logic, respectively; simulating the MedSBA scheme in the OPNET software as well as examining its computational complexity and storage indicates the efficiency of the present scheme.
Article
Full-text available
In body sensor networks, both wearable and implantable biosensors are deployed in a patient body to monitor and collect patient health record information. The health record information is then transmitted toward the medical server via a base station for analysis, diagnosis, and treatment by medical experts. Advancement in wireless technology although improves the patient health–monitoring mechanism, but still there are some limitations regarding security, privacy, and efficiency due to open wireless channel and limited resources of body sensor networks. To overcome these limitations, we have proposed an efficient and secure heterogeneous scheme for body sensor networks, in which biosensor nodes use a certificate-less cryptography environment to resolve the key escrow and certificate-management problems, while MS uses a public key infrastructure environment to enhance the scalability of the networks. Furthermore, we design an online/offline signcryption method to overcome the burden on biosensor nodes. We split the signcryption process into two phases: offline phase and online phase. In the offline phase, the major operations are computed without prior knowledge of patient data. While in online phase, the minor operations are computed when patient data are known. Besides, we have used a new hybrid blockchain technology approach for the secure transmission of patient information along with attributes stored in the medical server toward the cloud that provides ease of patient data access remotely from anywhere by the authorized users and data backup in case of medical server failure. Moreover, hybrid blockchain provides advantages of interoperability, transparency traceability, and universal access. The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. As compared to other existing schemes, our proposed scheme consumes fewer resources and efficient in terms of processing cost, transmission overhead, and energy consumption.
Article
Full-text available
A trusted routing scheme is very important to ensure the routing security and efficiency of wireless sensor networks (WSNs). There are a lot of studies on improving the trustworthiness between routing nodes, using cryptographic systems, trust management, or centralized routing decisions, etc. However, most of the routing schemes are difficult to achieve in actual situations as it is difficult to dynamically identify the untrusted behaviors of routing nodes. Meanwhile, there is still no effective way to prevent malicious node attacks. In view of these problems, this paper proposes a trusted routing scheme using blockchain and reinforcement learning to improve the routing security and efficiency for WSNs. The feasible routing scheme is given for obtaining routing information of routing nodes on the blockchain, which makes the routing information traceable and impossible to tamper with. The reinforcement learning model is used to help routing nodes dynamically select more trusted and efficient routing links. From the experimental results, we can find that even in the routing environment with 50% malicious nodes, our routing scheme still has a good delay performance compared with other routing algorithms. The performance indicators such as energy consumption and throughput also show that our scheme is feasible and effective.
Article
Full-text available
Abstract In recent years, the status of cooperation and innovation has become increasingly important. Research on the behavior of production, education, and research organizations has attracted widespread attention. Blockchain technology is considered as another subversive technology following cloud computing, wireless sensor networks, and big data. It is highly concerned by governments, financial institutions, and technology companies. Blockchain technology is essentially a technical solution that collectively maintains a reliable database through a decentralized, high-trust way. Blockchain WEB technology has not only used in financial and other fields, but also has a great potential for application in the fields of production, education, and research. It has expected to play an important role in the establishment of a trust mechanism in the “Internet +” production, research, and innovation and promote education. Drawing on the experience in blockchain applications in the financial sector, the blockchain in the education sector mainly embodies six application modes: building individual science credit data, creating an intelligent education Taobao platform, developing a degree certificate system, and building a new ecology of open educational resources. Of course, due to the uniqueness and complexity of the trust field in the cooperation innovation of industry, universities, and research institutes, the application of blockchain technology is also faced with difficulties in the application, promotion, and operation of production and research, fuzzy ownership of educational big data, limited data storage space, and potential safety problems of blockchain technology. There are many challenges such as the privacy protection risks of teachers and students.
Article
Full-text available
In this paper, we propose a novel blockchain-based contractual routing (BCR) protocol for a network of untrusted IoT devices. In contrast to conventional secure routing protocols in which a central authority (CA) is required to facilitate the identification and authentication of each device, the BCR protocol operates in a distributed manner with no CA. The BCR protocol utilizes smart contracts to discover a route to a destination or data gateway within heterogeneous IoT networks. Any intermediary device can guarantee a route from a source IoT device to a destination device or gateway. We compare the performance of BCR with that of the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in a network of 14 devices. The results show that the routing overhead of the BCR protocol is 5 times lower compared to AODV at the cost of a slightly lower packet delivery ratio. BCR is fairly resistant to both Blackhole and Greyhole attacks. The results show that the BCR protocol enables distributed routing in heterogeneous IoT networks.
Chapter
Nowadays, Wireless Sensor Networks (WSNs) are facing various challenges. Cost efficiency, low energy consumption, reliable data communication between nodes and security are the major challenges in the field of WSNs. On the other hand, blockchain is also a very hot domain in this era. Blockchain has a remedy for some challenges, which are faced by the WSNs, e.g., secure data transactions and trustworthiness, etc. By keeping in mind the security issues, we induce blockchain into the WSNs. In short, we have proposed a trust model to avoid the malicious attacks and keep the transact data using the blockchain property of immutability. Moreover, an enhanced version of Proof of Stack (PoS), i.e., the Proof of Authority (PoA) consensus mechanism is being used to add a new node in the network. Additionally, the smart contract is also written to check the working status of nodes. Simulations are performed in order to record the transaction cost and execution cost.
Article
The Internet of things (IoT) has been widely used since its high efficiency and real-time collaboration. Wireless sensor network as the core technology to support the operation of the IoT, the security problem is becoming more and more serious. Aiming at the problem that the existing malicious node detection methods in wireless sensor networks can not be guarantee by fairness and traceability of detection process, in this paper, it presents a blockchain trust model (BTM) for malicious node detection in wireless sensor networks. Firstly, it gives the whole framework of the trust model. Then it constructs the blockchain data structure which is used to detect malicious nodes. Finally, it realizes the detection of malicious nodes in 3D space by using the blockchain smart contract and WSNs quadrilateral measurement localization method, and the voting consensus results are distributed recorded in the blockchain. The simulation results show that the model can effectively detect malicious nodes in WSNs and it can also ensure the traceability of the detection process.
Chapter
The management of heterogeneous distributed sensor networks requires new solutions to address the problem of data quality and false data detection in Wireless Sensor Networks (WSN). In this paper, we present a nonlinear cooperative control algorithm based on game theory and blockchain. Here, a new model is proposed for the automatic processing and management of data in heterogeneous distributed wireless sensor networks stored in a blockchain. We apply our algorithm for improving temperature data quality in indoor surfaces.