International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Preserving Security in Terms of Authentication on Blockchain-Based Wireless Sensor Network (WSN)

Author NameAuthor Details

Tejbir Singh, Rohit Vaid

Tejbir Singh[1]

Rohit Vaid[2]

[1]Department of Computer Science and Engineering, MM Engineering College, Maharishi Markandeshwar (Deemed to be University), Mullana, Ambala, Haryana, India.

[2]Department of Computer Science and Engineering , MM Engineering College, Maharishi Markandeshwar (Deemed to be University), Mullana, Ambala, Haryana, India.

Abstract

Sensor nodes in wireless sensor networks have limited resources such as computing power, storage space, and battery life. Since WSNs are often deployed in untrusted areas, they are vulnerable to a wide variety of threats. Given the impossibility of preventing security breaches in a WSN, its data quality is likewise called into doubt. The authentication method in WSNs allows for the verification of the authenticity of both resources and data. Authentication in WSNs safeguards the integrity of the original data by determining whether it came from a trusted source and only allowing modifications made by that source. Existing authentication systems, however, have certain security flaws, such as those vulnerable to Identity (ID) spoofing attacks. As another example of promising new technology, blockchain has shown great promise in the realm of cyber security. The blockchain's security features include its cryptographic protection, immutability, non-reputability, irrevocability, auditability, and verifiability. This research is motivated by a desire to implement blockchain capabilities in WSNs for data integrity, security, and efficiency. In this study, research developed a new blockchain-based authentication method specifically for WSNs. Sensor nodes and a blockchain were built into the study's system architecture with the help of users and a private blockchain. A full security audit was done on the data used in the study. Concurrently, the proposed model was deployed to a wireless sensor node (WiSeN) sensor node to analyze its performance. According to the simulation findings, the suggested optimized strategy outperforms the traditional non-optimized technique in terms of accuracy. Furthermore, MVO has greater accuracy than ACO and PSO. The advantages of this technology and the issues with the present authentication processes make it imperative that the WSN deploy it. Optimization strategies are tested to improve security in WSNs. PSO, ACO, and MVO boost precision, recall, and F1-score. These procedures are trustworthy and might improve network resilience and counter real-world challenges. Security solutions may improve with further study.

Index Terms

Blockchain

WSN

Security

WiSeN Sensor Node

Performance

Authentication Method

Reference

  1. 1.
    A. Arivarasi and P. Ramesh, “RETRACTED ARTICLE: An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. S1. Springer Science and Business Media LLC, pp. 9–9, Mar. 14, 2021. doi: 10.1007/s12652-021-03021-2.
  2. 2.
    M. Bala Krishna and M. N. Doja, “Deterministic K?means secure coverage clustering with periodic authentication for wireless sensor networks,” International Journal of Communication Systems, vol. 30, no. 4. Wiley, Sep. 24, 2015. doi: 10.1002/dac.3024.
  3. 3.
    M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L. Shu, “Authentication Protocols for Internet of Things: A Comprehensive Survey,” Security and Communication Networks, vol. 2017. Hindawi Limited, pp. 1–41, 2017. doi: 10.1155/2017/6562953.
  4. 4.
    M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, May 2018, doi: 10.1016/j.future.2017.11.022.
  5. 5.
    R. K. Sharma and Dr. P. Gandhi, "Estimate reliability of component-based software system using modified neuro-fuzzy model," International Journal of Engineering & Technology, vol. 6, no. 2. Science Publishing Corporation, p. 45, May 24, 2017. doi: 10.14419/ijet.v6i2.7722.
  6. 6.
    T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security Services Using Blockchains: A State of the Art Survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 1. Institute of Electrical and Electronics Engineers (IEEE), pp. 858–880, 2019. doi: 10.1109/comst.2018.2863956.
  7. 7.
    C. V. Nguyen, M. T. Nguyen, T. T. H. Le, T. A. Tran, and D. T. Nguyen, "Blockchain Technology in Wireless Sensor Network: Benefits and Challenges," *ICSES Trans. Comput. Netw. Commun.*, pp. 1-4, 2021.
  8. 8.
    C. H. Liu and Y. F. Chung, "Secure user authentication scheme for wireless healthcare sensor networks," *Comput. Electr. Eng.*, pp. 250-261, 2017.
  9. 9.
    R. Riaz, N. A. Gillani, S. Rizvi, S. Shokat, and S. L. Kwon, "SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics," *Wirel. Commun. Mob. Comput.*, pp. 6370742, 2019.
  10. 10.
    Y. Lu, J. Zhai, R. Zhu, and J. Qin, "Study of Wireless Authentication Center with Mixed Encryption in WSN," *J. Sens.*, vol. 2016, article 9297562, 2016.
  11. 11.
    R. K. Sharma and P. Gandhi, "Study of Reliability of Object-Oriented Structure Consuming CK Metrics," in *2019 6th International Conference on Computing for Sustainable Global Development (INDIACom)*, pp. 828-831, Mar. 2019.
  12. 12.
    X. Zhang and F. Wen, "A novel anonymous user WSN authentication for Internet of Things," *Soft Comput.*, vol. 23, pp. 5683-5691, 2019.
  13. 13.
    T. A. Alghamdi and N. Javaid, "Energy optimization with authentication and cost-effective storage in the wireless sensor IoTs using blockchain,” Computational Intelligence, vol. 40, no. 1. Wiley, Feb. 2024. doi: 10.1111/coin.12630.
  14. 14.
    R. Vatambeti, E. S. P. Krishna, M. G. Karthik, and V. K. Damera, "Securing the medical data using enhanced privacy preserving based blockchain technology in the Internet of Things," Cluster Computing, vol. 27, no. 2. Springer Science and Business Media LLC, pp. 1625–1637, Jun. 02, 2023. doi: 10.1007/s10586-023-04056-0.
  15. 15.
    J. Xiao, C. Li, Z. Li, and J. Zhou, “BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques,” Scientific Reports, vol. 14, no. 1. Springer Science and Business Media LLC, Apr. 27, 2024. doi: 10.1038/s41598-024-60338-6.
  16. 16.
    M. A. de Jesus et al., “Security in Blockchain?Based Smart Cyber?Physical Applications Relying on Wireless Sensor and Actuators Networks,” Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection. Wiley, pp. 279–310, Mar. 22, 2024. doi: 10.1002/9781394196470.ch14.
  17. 17.
    Sureshkumar, C.; Sabena, S. Fuzzy-Based Secure Authentication and Clustering Algorithm for Improving the Energy Efficiency in Wireless Sensor Networks. Wirel. Pers. Commun. 2020, 112, pp. 1517–1536.
  18. 18.
    Bao, Z.; Shi, W.; He, D.; Choo, K.R. IoTChain: A Three-Tier Blockchain-based IoT Security Architecture. arXiv 2018, arXiv:1806.02008v2.
  19. 19.
    Sharma, R. K., & Gandhi, P. (2016, March). Quality assurance of component-based software systems. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 3850-3854). IEEE.
  20. 20.
    Yavari, M.; Safkhani, M.; Kumari, S.; Kumar, S.; Chen, C.M. An Improved Blockchain-Based Authentication Protocol for IoT Network Management. Secure. Commun. Netw. 2020, 2020, 8836214
  21. 21.
    Alan, C.H.L.; Yeung, K.H.; Yan, F. Blockchain-based authentication in IoT networks. In Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, 10–13 December 2018; pp. 1–8.
  22. 22.
    Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. A Lightweight Blockchain Based Framework for Underwater IoT. Electronics 2019, 8, 1552.
  23. 23.
    Gandhi, P., Khan, M. Z., Sharma, R. K., Alhazmi, O. H., Bhatia, S., &Chakraborty, C. (2022). Software Reliability Assessment Using Hybrid Neuro-Fuzzy Model. Computer Systems Science & Engineering, 41(3).
  24. 24.
    Dong, S.; Yang, H.; Yuan, J.; Jiao, L.; Yu, A.; Zhang, J. Blockchain-based cross-domain authentication strategy for trusted access to mobile devices in the IoT. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1–3
  25. 25.
    Goyat, R.; Kumar, G.; Saha, R.; Conti, M.; Rai, M.K.; Thomas, R.; Alazab, M.; Hoon-Kim, T. Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things. IEEE Internet Things J. 2020, 9, 14203–14215.
  26. 26.
    Yazdinejad, A.; Parizi, R.M.; Srivastava, G.; Dehghantanha, A.; Choo, K.K.R. Energy efficient decentralized authentication in the internet of underwater things using blockchain. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6.
  27. 27.
    Hong, S. P2P networking-based Internet of Things (IoT) sensor node authentication by blockchain. Peer-Peer Netw. Appl. 2020, 13, pp. 579–589.
  28. 28.
    Almadhoun, R.; Kadadha, M.; Alhemeiri, M.; Alshehhi, M.; Salah, K. A User Authentication Scheme of IoT Devices using Blockchain-enabled Fog Nodes. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; pp. 1–8
  29. 29.
    Rathod, T.; Jadav, N.K.; Alshehri, M.D.; Tanwar, S.; Sharma, R.; Felseghi, R.-A.; Raboaca, M.S. Blockchain for Future Wireless Networks: A Decade Survey. Sensors 2022, 22, 4182. https://doi.org/10.3390/s22114182
  30. 30.
    K. Suresh Kumar, R. Rajeswari, Ch Vidyadhari, and B. Santhosh Kumar. "Mathematical modeling approaches for blockchain technology." In IOP conference series: materials science and engineering, vol. 981, no. 2, p. 022001. IOP Publishing, 2020.
  31. 31.
    Sharma C, Vaid R. “Analysis of existing protocols in WSN based on key parameters” In Proceedings of 2nd international conference on communication, computing and networking, Volume16, PP.165171, ISSN (electronic):2367-3389.Springer, Singapore,2019.
  32. 32.
    Sharma C, Vaid R." A Novel Sybil Attack Detection and Prevention Mechanism for Wireless Sensor Network. In 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) 2021 Oct 7 pp.340-345.IEEE.
  33. 33.
    Sharma C.Vaid R "Energy –Efficient and Secure Data Forwarding Mechanism for Balancing Cluster Lifetime for Huge Size Wireless Sensor Network' Journal of Computational and Theoretical Nanoscience, Volume 16, No 9, pp. 3961-3964, ISSN (Online):1546-1955, September 2019.
  34. 34.
    Sharma C., Vaid R. and Gupta K “KDS: Keyless Data Security in Wireless Sensor Networks” 3rd International Conference on ‘Mobile Radio Communications & 5G Network (MRCN-2022) in University Institute of Engineering &Technology, Kurukshetra University, Volume588, pp 613-624, Springer, Singapore. https://doi.org/10.1007/978-981-19-7992-8_51.
  35. 35.
    Tejbir Singh, Rohit Vaid, and Avinash Sharma. "Security Issues in Blockchain Integrated WSN: Challenges and Concerns." In 2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), DOI:10.1109/ICSES55317.2022.9914006 pp. 1-5. IEEE, 2022.
  36. 36.
    Mohd Younus Dar and Tejbir Singh. “Study of Security to Block Chain under Wireless Sensor Network (WSN)”. International Journal of Wireless Network Security, Volume 7, Issue 2, PP. 1-7, Journal Pub, 2021.
  37. 37.
    Singh, T., Vaid, R. (2023). Enigmas of Various Techniques to Implementing Authentication and Integrity in Blockchain-Based Wireless Sensor Networks. Lecture Notes in Electrical Engineering, vol 1040. Springer, Singapore. https://doi.org/10.1007/978-981-99-2271-0_29.
SCOPUS
SCImago Journal & Country Rank