Abstract

Internet of Things (IoT) is an emerging domain in which different devices communicate with each other through minimum human intervention. IoT devices are usually operated in hostile and unattended environments. Moreover, routing in current IoT architecture becomes inefficient due to malicious and unauthenticated nodes’ existence, minimum network lifetime, insecure routing, etc. This paper proposes a lightweight blockchain based authentication mechanism where ordinary sensors’ credentials are stored. As IoT nodes have a short lifespan due to energy depletion, few credentials are stored in the blockchain to achieve lightweight authentication. Moreover, the route calculation is performed by a genetic algorithm enabled software defined network controller, which is also used for on-demand routing to optimize the energy consumption of the nodes in the IoT network. Furthermore, a route correctness mechanism is proposed to check the existence of malicious nodes in the calculated route. Moreover, a detection mechanism is proposed to restrict the malicious nodes’ activities, while a malicious node’s list is maintained in the blockchain, which is used in the route correctness mechanism. The proposed model is evaluated by performing intensive simulations. The effectiveness of the proposed model is depicted in terms of gas consumption, which shows the optimized utilization of resources. The residual energy of the network shows optimized route calculation, while the malicious node detection method shows the number of packets dropped.

Highlights

  • Geographical exploration has gained much popularity over the past few decades, which is performed using sensors enabled Internet of Things (IoT) devices

  • An Lightweight Registration and Authentication (LRA) mechanism is proposed in which credentials are stored on the blockchain for their further usage in the routing process

  • Genetic Algorithm (GA) enabled Software Defined Networking (SDN) controller is used for calculating the routes between source and destination node, which results in optimized energy consumption of Relay Nodes (RNs)

Read more

Summary

INTRODUCTION

Geographical exploration has gained much popularity over the past few decades, which is performed using sensors enabled Internet of Things (IoT) devices. Base Station Cluster Head Genetic Algorithm Hybrid Blockchain based identity Authentication Internet of Things Lightweight Registration and Authentication Malicious Node Detection Proof of Authority Proof of Stake Proof of Work Relay Nodes Route Correctness Mechanism Software Defined Network Wireless Sensor Networks Hop in Route Gene in the Selected Route k at ith hop Energy of RN Fitness of kth route ID of RN The Number of Route Location of RN Malicious Node’s List part in the network’s tasks, such as data forwarding and data storage. A blockchain based distributed and tamper-proof data storage mechanism is proposed to authenticate the nodes [11]. The authors in [15] propose a Hybrid Blockchain based identity Authentication (HBA) scheme They do not consider the internal RNs’ malicious behaviour that affects secure data forwarding.

TRUSTED ROUTING TO AVOID MALICIOUS NODES
2) Methods
AUTHENTICATION OF NETWORK NODES
AUTHENTICATION OF RELAY NODES
GA ENABLED SDN ROUTING
Inputs
PERFORMANCE EVALUATION
BLACK HOLE ATTACK
SMART CONTRACT ANALYSIS
Hello Packets
Findings
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.