| Literature DB >> 35062371 |
Saba Awan1, Nadeem Javaid1,2, Sameeh Ullah3, Asad Ullah Khan1, Ali Mustafa Qamar4, Jin-Ghoo Choi5.
Abstract
In this paper, an encryption and trust evaluation model is proposed on the basis of a blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) are stored. The authentication of ANs and SNs is performed in public and private blockchains, respectively. However, inauthentic nodes utilize the network's resources and perform malicious activities. Moreover, the SNs have limited energy, transmission range and computational capabilities, and are attacked by malicious nodes. Afterwards, the malicious nodes transmit wrong information of the route and increase the number of retransmissions due to which the SNs' energy is rapidly consumed. The lifespan of the wireless sensor network is reduced due to the rapid energy dissipation of the SNs. Furthermore, the throughput increases and packet loss increase with the presence of malicious nodes in the network. The trust values of SNs are computed to eradicate the malicious nodes from the network. Secure routing in the network is performed considering residual energy and trust values of the SNs. Moreover, the Rivest-Shamir-Adleman (RSA), a cryptosystem that provides asymmetric keys, is used for securing data transmission. The simulation results show the effectiveness of the proposed model in terms of high packet delivery ratio.Entities:
Keywords: Rivest–Shamir–Adleman; authentication; blockchain; secure routing; smart contract; trust evaluation; wireless sensor network
Mesh:
Year: 2022 PMID: 35062371 PMCID: PMC8781821 DOI: 10.3390/s22020411
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Literature review.
| Problems Already | Solutions Already | Validations Already Done | Problems to Be Addressed | C1 | C2 | C3 |
|---|---|---|---|---|---|---|
| Incorrect location estimation and energy dissipation | Node’s trust values are based on data based and behavioral based trust [ | False Positive Rate (FPR), Detection Accuracy (DA), False Negative Rate (FNR), localization error, energy consumption | Malicious node detection consumes high computational cost. Due to indirect trust evaluation, nodes act maliciously | × | √ | × |
| Existing models do not allow content access, reliable authentication and trust management | Blockchain authentication and trust module attains authentication and trust via digital signature [ | N/A | Weak hashing algorithm. Poor authentication, malicious nodes tamper with the data | √ | × | × |
| No traceability mechanism of nodes’ data fairness | BTM for malicious node detection is proposed which ensures traceability and transparency [ | Security, traceability and reliability analysis | PoW requires high energy and faster computer processing to solve cryptographic puzzles that make it costly | × | √ | × |
| SNs captured by malicious nodes broadcast inaccurate localization | Range free algorithm is proposed for secure localization [ | Average localization error, localization error variance | Large communications overhead, consumes more energy due to the dynamic behavior of SNs | × | √ | × |
| Security threats arise in IoT platform | IoT authentication protocol based on the blockchain is proposed [ | N/A | Sink nodes do not authenticate the SNs at the time of assigning sequence numbers | √ | × | √ |
| Dynamic WSN has more uncertainty and a large coverage area, which causes trust issues | Registration of nodes, cluster formation and node logout [ | Forward and backward security, resistance to impersonation, storage overhead, energy consumption | Complexity increases in key management. Communication overhead between BS and high storage space sensors | √ | × | √ |
| Lack of traceability of each node in the IoT network | IoT framework is proposed where tractability of each node requires nodes’ registration into the blockchain [ | Probability of attack success, authentication accuracy | Requires extra maintenance cost and storage capacity. Data tampering in local database | × | √ | √ |
| Secure socket layer does not ensure user anonymity | The proposed system ensures data authenticity using blockchain to store data [ | Power consumption, temperature, humidity measurement | N/A | √ | × | × |
| Network latency and data delivery issues occur due to mobile sensors | An intrusion prevention framework is proposed for mobile IoT devices to provide reliable data routing [ | Network lifetime, Packet Delivery Ratio (PDR), energy consumption, delay and routing overheads | In XOR hashing function, if an attacker knows one of the plain texts, then get another through them | × | √ | √ |
| Increase network overhead | Trust aware localized routing discovers multiple routes but selects one route with trusted SNs [ | Security and throughput, encryption and decryption performance, time complexity | No authentication mechanism. Malicious nodes cause low packet delivery and high packet delay | √ | √ | × |
| Trust issues and single point of failure due to the central authority | BCR protocol is introduced that enables trust relationship between IoT vendors and cooperators [ | Throughput, PDR, route acquisition latency, routing overhead | Low PDR | × | √ | × |
| Malicious nodes cause gray and black hole attacks | A routing scheme through blockchain and reinforcement learning is used [ | Enhance the routing efficiency and security of WSNs | Expense and burden increased on the server side due to the operational complexity | √ | × | × |
| Storage and bandwidth issues | A light chain system for resource constrained devices is proposed [ | Hash operations, hash quality, throughput, storage cost | N/A | × | × | √ |
| Distributed nature requires high storage and faster transaction | Multi-level architecture for handling the IoUT data is proposed [ | Reliability, accuracy, total remaining energy, energy consumption | N/A | √ | × | √ |
| Local copy of the blockchain records is not feasible | Aggregated information is used to reduce the communication cost [ | Relative frequency, communication cost | N/A | × | × | √ |
| Blockchain has a slow update rate, while, in Tangle, miners validate its two previous transactions before joining network | The authors presented an optimized policy by using Tangle and blockchain technologies for sampling rate [ | Age of information and sampling interval | N/A | × | × | √ |
| PoW requires high processing ability and data storage availability | Mobile edge computing framework is proposed to utilize the blockchain [ | Total net revenue | N/A | √ | × | √ |
| Nodes may behave selfishly, they do not forward the packet | An incentive mechanism encourages the nodes to store the data [ | The proposed system reduced the computing power as compared to the PoW | No authentication mechanism, expensive data storage | √ | × | √ |
| Blockchain requires high resources to perform PoW on mobile devices | Rolling blockchain is proposed where smart cars are used as the nodes of the WSN. The whole database is stored on the server [ | Probability of finding the connected paths | Merkle tree is not utilized for this network | √ | × | √ |
| High latency, scalability issues and single point of failure | Blockchain and SDN based hybrid architecture are used [ | Hash rate, transactions per second, average time per block and latency | Credential information stored on SDN can be leaked | × | × | √ |
| High computational cost and storage constraint due to a large number of IoT devices | SDN, edge, fog and blockchain are used to develop a secure attack detection system [ | F1-score, detection time, detection rate, accuracy, bandwidth Matthews correlation coefficient | System complexity increased, requires high computational power, cloud causes high latency | × | × | √ |
| The service provider offers malicious services to the client | A blockchain based fair nonrepudiation service provisioning mechanism is proposed [ | Average gas consumption, average transaction latency, average throughput | No off-chain mechanism is mentioned to deliver the major service part | × | √ | √ |
| No authentication, presence of malicious nodes, low PDR, high delay, usage of symmetric keys | A blockchain based authentication and trust evaluation mechanism is proposed for secure routing. RSA encryption scheme is used [Proposed Model] | Network lifetime, energy consumption, throughput, gas consumption, transaction latency, processing time of RSA encryption and processing time of trust evaluation | High time consumption in generating the RSA keys | √ | √ | √ |
Note: C1, C2 and C3 denote authentication, trust evaluation and security, respectively.
Figure 1Proposed system model.
Mapping table of limitations, their solutions and the validation parameters.
| Identified Limitations | Proposed Solutions | Validation Done |
|---|---|---|
| L1: Presence of malicious nodes | S1: Trust evaluation considering NCQ value to remove malicious nodes from the network | V1: Trust values of the SNs, FNR, FPR and DA. The results are depicted in |
| L2: Low PDR due to the involvement of malicious nodes L.3: High energy consumption of the SNs | S2, S3: The trusted SNs perform routing. SNs send their packets to the ANs, who forward the packets to BSs. Through this process, little energy is consumed by the SNs | V2, V3: PDR, network lifetime and residual energy. The results are depicted in |
| L4: Key exchange problem | S4: RSA is used for the secure transmission of data considering key generation, encryption and decryption | V4: Direct validation is not shown explicitly |
Simulation parameters.
| Parameters | Values |
|---|---|
| Sensing area | 100 × 100 m |
| SNs | 100 |
| ANs | 4 |
| BSs | 2 |
| Deployment | Random |
| Initial energy of SNs | 0.05 J |
Figure 2(a) Packet delivery ratio, (b) throughput.
Figure 3(a) FPR and FNR, (b) detection accuracy.
Figure 4(a) Number of dead nodes with rounds, (b) residual energy of the nodes.
Figure 5(a) Processing time of trust evaluation, (b) processing time of RSA encryption.
Figure 6Energy consumption in trust evaluation of nodes.
Figure 7(a) Comparison of gas consumption between PoA and PoW, (b) comparison of average transaction latency between PoA and PoW.
Figure 8Formal analysis of smart contract using Oyente.
Figure 9Dead nodes with and without attacks.
Figure 10Residual energy with and without attacks.
Figure 11PDR with and without attacks.