Literature DB >> 33375153

A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.

Noshina Tariq1, Muhammad Asim1, Farrukh Aslam Khan2, Thar Baker3, Umair Khalid1, Abdelouahid Derhab2.   

Abstract

A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use of smart applications in every domain of life. Along with the bounties of smart things and applications, there are hazards of external and internal attacks. Unfortunately, mitigating internal attacks is quite challenging, where network lifespan (w.r.t. energy consumption at node level), latency, and scalability are the three main factors that influence the efficacy of security measures. Furthermore, most of the security measures provide centralized solutions, ignoring the decentralized nature of SN-powered Internet of Things (IoT) deployments. This paper presents an energy-efficient decentralized trust mechanism using a blockchain-based multi-mobile code-driven solution for detecting internal attacks in sensor node-powered IoT. The results validate the better performance of the proposed solution over existing solutions with 43.94% and 2.67% less message overhead in blackhole and greyhole attack scenarios, respectively. Similarly, the malicious node detection time is reduced by 20.35% and 11.35% in both blackhole and greyhole attacks. Both of these factors play a vital role in improving network lifetime.

Entities:  

Keywords:  blockchain; energy-efficiency; internet of things; multi-mobile code; trust

Year:  2020        PMID: 33375153     DOI: 10.3390/s21010023

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


  3 in total

1.  Research on Coverage Optimization in a WSN Based on an Improved COOT Bird Algorithm.

Authors:  Yihui Huang; Jing Zhang; Wei Wei; Tao Qin; Yuancheng Fan; Xuemei Luo; Jing Yang
Journal:  Sensors (Basel)       Date:  2022-04-28       Impact factor: 3.847

2.  Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.

Authors:  Umer Farooq; Muhammad Asim; Noshina Tariq; Thar Baker; Ali Ismail Awad
Journal:  Sensors (Basel)       Date:  2022-06-16       Impact factor: 3.847

3.  THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.

Authors:  Danyal Arshad; Muhammad Asim; Noshina Tariq; Thar Baker; Hissam Tawfik; Dhiya Al-Jumeily Obe
Journal:  PLoS One       Date:  2022-07-28       Impact factor: 3.752

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.