4.6 Article

Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks

Journal

SENSORS
Volume 22, Issue 2, Pages -

Publisher

MDPI
DOI: 10.3390/s22020411

Keywords

authentication; blockchain; Rivest-Shamir-Adleman; secure routing; smart contract; trust evaluation; wireless sensor network

Funding

  1. Basic Science Research Program through the National Research Foundation (NRF) of Korea - Ministry of Education [2018R1D1A1B07048948]
  2. National Research Foundation of Korea [2018R1D1A1B07048948] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

In this paper, an encryption and trust evaluation model based on blockchain is proposed to address the issue of inauthentic nodes in wireless sensor networks. By performing authentication in public and private blockchains, illegal nodes can be identified and malicious nodes can be eliminated by computing trust values. Simulation results demonstrate the effectiveness of the proposed model in terms of high packet delivery ratio.
In this paper, an encryption and trust evaluation model is proposed on the basis of a blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) are stored. The authentication of ANs and SNs is performed in public and private blockchains, respectively. However, inauthentic nodes utilize the network's resources and perform malicious activities. Moreover, the SNs have limited energy, transmission range and computational capabilities, and are attacked by malicious nodes. Afterwards, the malicious nodes transmit wrong information of the route and increase the number of retransmissions due to which the SNs' energy is rapidly consumed. The lifespan of the wireless sensor network is reduced due to the rapid energy dissipation of the SNs. Furthermore, the throughput increases and packet loss increase with the presence of malicious nodes in the network. The trust values of SNs are computed to eradicate the malicious nodes from the network. Secure routing in the network is performed considering residual energy and trust values of the SNs. Moreover, the Rivest-Shamir-Adleman (RSA), a cryptosystem that provides asymmetric keys, is used for securing data transmission. The simulation results show the effectiveness of the proposed model in terms of high packet delivery ratio.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available