Abstract

In this paper, an encryption and trust evaluation model is proposed on the basis of a blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) are stored. The authentication of ANs and SNs is performed in public and private blockchains, respectively. However, inauthentic nodes utilize the network’s resources and perform malicious activities. Moreover, the SNs have limited energy, transmission range and computational capabilities, and are attacked by malicious nodes. Afterwards, the malicious nodes transmit wrong information of the route and increase the number of retransmissions due to which the SNs’ energy is rapidly consumed. The lifespan of the wireless sensor network is reduced due to the rapid energy dissipation of the SNs. Furthermore, the throughput increases and packet loss increase with the presence of malicious nodes in the network. The trust values of SNs are computed to eradicate the malicious nodes from the network. Secure routing in the network is performed considering residual energy and trust values of the SNs. Moreover, the Rivest–Shamir–Adleman (RSA), a cryptosystem that provides asymmetric keys, is used for securing data transmission. The simulation results show the effectiveness of the proposed model in terms of high packet delivery ratio.

Highlights

  • Introduction iationsA Wireless Sensor Network (WSN) plays an important part in the growth of various applications such as healthcare, the military, industrial surveillance, etc., [1,2,3]

  • If NodeExists (ANID, PUB) = true || VerifyID (BS ID ) = error return error message (); Aggregator Nodes (ANs) is revoked from joining PUB; else return true (ANID registered with SPUB ); ANID is permanently stored in PUB; end if NodeExists (SNID, PRB) = true || VerifyID (ANID ) = error return error message (); Sensor Nodes (SNs) is revoked from joining PRB; else return true (SNID registered with SPRB ); SNID is permanently stored in PRB; end

  • In the BTM with no authentication, the malicious nodes participate in the network and send excessive amount of wrong information to the forwarder nodes that consume a lot of energy while transferring the packets, while little energy is consumed in the proposed model

Read more

Summary

Trust Evaluation of Sensor Nodes

In [10], the authors propose a trust model utilizing a blockchain to ensure secure localization. The locations of the unknown nodes are determined using the trust values of the benign nodes. The trust values are the aggregation of the behavioral and data based trust. In [19], the authors propose a trust model to prevent the involvement of malicious nodes to ensure traceability and transparency. The credibility of the nodes is computed on the basis of successful and unsuccessful communications. The authors in [20] propose a secure range free localization algorithm where the node’s location is computed based on the degree of connectivity between SNs. The trust values of the benign nodes are determined by considering mobility, remaining battery, reputation value [23] and a neighbor node list

Nodes’ Authentication
Secure Routing in Networks
Lightweight Blockchain
Data Storage
Data Security and Privacy
Nonrepudiation Mechanism
Problem Statement
System Model
Initialization
Registration
Authentication
Trust Evaluation Mechanism
Delayed Transmission
Forwarding Rate
Response Time
Node Communication Quality
Simulation Results
Simulation Setup
Residual Energy
False Positive Rate
False Negative Rate
Detection Accuracy
Formal Security Analysis
Integer Underflow and Overflow
Parity Multisig Bug 2
Callstack Depth Attack Vulnerability
Timestamp Dependency
Attacker Model
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call