Abstract
In wireless sensor networks (WSNs), the presence of malicious nodes (MNs) poses significant challenges to data integrity, network stability, and system reliability. These issues are intensified by energy resource constraints and limitations within centralized authentication systems, necessitating an energy-efficient solution to ensure real-time responsiveness. Although artificial intelligence-driven approaches enhance detection capabilities, they overcome challenges related to data volume, coordination overhead, and latency in centralized control. This study introduces blockchain-machine learning (BC-ML), a novel hybrid model that seamlessly integrates blockchain and machine learning (ML) techniques to effectively identify MNs in WSNs. The model establishes an energy-efficient blockchain among cluster heads (CHs) for robust node authentication, incorporating a Schnorr-like zero-knowledge-proof technique to validate node data during communication initiation. Utilizing a hybrid lightweight approach with both symmetric and asymmetric ciphers enhances the security of node data transmission. A new proof-of-authority method is introduced, which leverages node digital certificates instead of conventional data transactions. This consensus mechanism reduces the processing overhead associated with larger data sizes in traditional proof-of-work methods, thereby improving both energy efficiency and scalability. To address dataset imbalances, the model employs a hybrid unsupervised ML technique, combining adaptive synthetic sampling with a convolutional neural network for efficient analysis of nodes and network features. The ML model, hosted on a robust data server, ensures ongoing oversight by updating CHs with security levels for detected MNs, thereby reducing storage and mitigating coordination challenges. Comprehensive analyses validate the effectiveness of the BC-ML model for detecting MNs, optimizing resource utilization, minimizing delays, and prolonging node and network lifetimes. Security analysis further confirms the ability of the model to mitigate diverse attacks and meet the stringent WSN security requirement.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.