Abstract

This paper proposes a blockchain-based node authentication model for the Internet of sensor things (IoST). The nodes in the network are authenticated based on their credentials to make the network free from malicious nodes. In IoST, sensor nodes gather the information from the environment and send it to the cluster heads (CHs) for additional processing. CHs aggregate the sensed information. Therefore, their energy rapidly depletes due to extra workload. To solve this issue, we proposed distance, degree, and residual energy-based low-energy adaptive clustering hierarchy (DDR-LEACH) protocol. DDR-LEACH is used to replace CHs with the ordinary nodes based on maximum residual energy, degree, and minimum distance from BS. Furthermore, storing a huge amount of data in the blockchain is very costly. To tackle this issue, an external data storage, named as interplanetary file system (IPFS), is used. Furthermore, for ensuring data security in IPFS, AES 128-bit is used, which performs better than the existing encryption schemes. Moreover, a huge computational cost is required using a proof of work consensus mechanism to validate transactions. To solve this issue, proof of authority (PoA) consensus mechanism is used in the proposed model. The simulation results are carried out, which show the efficiency and effectiveness of the proposed system model. The DDR-LEACH is compared with LEACH and the simulation results show that DDR-LEACH outperforms LEACH in terms of energy consumption, throughput, and improvement in network lifetime with CH selection mechanism. Moreover, transaction cost is computed, which is reduced by PoA during data storage on IPFS and service provisioning. Furthermore, the time is calculated in the comparison of AES 128-bit scheme with existing scheme. The formal security analysis is performed to check the effectiveness of smart contract against attacks. Additionally, two different attacks, MITM and Sybil, are induced in our system to show our system model’s resilience against cyber attacks.

Highlights

  • The identity authentication of nodes is performed to remove the external unauthenticated nodes; cluster heads (CHs) are selected from ordinary nodes using the proposed minimum distance, highest degree, and highest residual energy (DDR) based LEACH protocol; interplanetary file system (IPFS) is used to provide distributed storage for Internet of sensors things (IoST); A payment method is proposed to motivate IPFS for long term data storage; A blockchain based secure service provisioning mechanism is proposed; An advanced symmetric encryption algorithm (AES) 128-bit is used for the integrity of data; Comparison of DDR-LEACH is performed with the LEACH protocol; Formal security analysis is performed for the smart contract to check its effectiveness; Man in the middle (MITM) and Sybil attacks are induced in the network, which show that our proposed system is resilient against these attacks

  • This paper presents a blockchain and IoST based network to minimize malicious activities and incur less computational cost

  • We propose a DDR-LEACH protocol in which

Read more

Summary

Introduction

In [21], no mechanism is proposed for the selection of new CHs. in PoW, the miners solve the puzzle for validating the transactions and adding the blocks into the blockchain [17,22]. In PoW, the miners solve the puzzle for validating the transactions and adding the blocks into the blockchain [17,22] This mining process takes considerable time due to puzzle’s complexity, which increases network’s computational cost. A blockchain based secure service provisioning mechanism is proposed; An advanced symmetric encryption algorithm (AES) 128-bit is used for the integrity of data; Comparison of DDR-LEACH is performed with the LEACH protocol; Formal security analysis is performed for the smart contract to check its effectiveness; Man in the middle (MITM) and Sybil attacks are induced in the network, which show that our proposed system is resilient against these attacks.

Limitations to be Addressed
Nodes’ Authentication
Lack of Data Storage
Lack of Data Privacy
Lack of Resources
Malicious Nodes’ Existence
Single Point of Failure Issue
System Components
Workflow of the System Model
Simulation Results and Discussion
Formal Security Analysis
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call