| Literature DB >> 30823560 |
Jidian Yang1, Shiwen He2, Yang Xu3, Linweiya Chen4, Ju Ren5.
Abstract
A trusted routing scheme is very important to ensure the routing security and efficiency of wireless sensor networks (WSNs). There are a lot of studies on improving the trustworthiness between routing nodes, using cryptographic systems, trust management, or centralized routing decisions, etc. However, most of the routing schemes are difficult to achieve in actual situations as it is difficult to dynamically identify the untrusted behaviors of routing nodes. Meanwhile, there is still no effective way to prevent malicious node attacks. In view of these problems, this paper proposes a trusted routing scheme using blockchain and reinforcement learning to improve the routing security and efficiency for WSNs. The feasible routing scheme is given for obtaining routing information of routing nodes on the blockchain, which makes the routing information traceable and impossible to tamper with. The reinforcement learning model is used to help routing nodes dynamically select more trusted and efficient routing links. From the experimental results, we can find that even in the routing environment with 50% malicious nodes, our routing scheme still has a good delay performance compared with other routing algorithms. The performance indicators such as energy consumption and throughput also show that our scheme is feasible and effective.Entities:
Keywords: blockchain; delay performance; efficiency; reinforcement learning; routing scheme; trust; wireless sensor networks
Year: 2019 PMID: 30823560 PMCID: PMC6412336 DOI: 10.3390/s19040970
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The malicious node in a backpressure (BP) routing algorithm.
Figure 2Loop routing problem in routing algorithms.
Figure 3The framework of the blockchain-based routing scheme.
Figure 4Specific formats of smart contracts and blockchain transactions. (a) Registration contract. (b) Token contract. (c) Token transaction.
Figure 5Implementation of the token transaction.
Specifications of devices.
| Parameter Name | Server Node | Terminal Node | Routing Node |
|---|---|---|---|
| CPU | 2.6 GHz | 1.2 GHz | 580 MHz |
| RAM | 16 GB | 1 GB | 32 MB |
| Storage | 1 TB | 16 GB | 256 MB |
| Network | 1000 Mb | 100 Mb | 100 Mb |
| OS | Ubuntu Server 16.04 | Raspbian 4.14 | OpenWRT 15.05 |
Figure 6Average delay of packets with 25% malicious nodes.
Figure 7Average delay of packets with 50% malicious nodes.
Figure 8Average transaction latency of proof of authority (PoA) and proof of work (PoW) blockchain systems.
Figure 9Average transaction consumption of PoA and PoW blockchain systems.
Figure 10Token transaction throughput of PoA and PoW blockchain systems.