| Literature DB >> 35271119 |
Sana Amjad1, Shahid Abbas1, Zain Abubaker1, Mohammed H Alsharif2, Abu Jahid3, Nadeem Javaid1,4.
Abstract
This paper proposes a blockchain-based node authentication model for the Internet of sensor things (IoST). The nodes in the network are authenticated based on their credentials to make the network free from malicious nodes. In IoST, sensor nodes gather the information from the environment and send it to the cluster heads (CHs) for additional processing. CHs aggregate the sensed information. Therefore, their energy rapidly depletes due to extra workload. To solve this issue, we proposed distance, degree, and residual energy-based low-energy adaptive clustering hierarchy (DDR-LEACH) protocol. DDR-LEACH is used to replace CHs with the ordinary nodes based on maximum residual energy, degree, and minimum distance from BS. Furthermore, storing a huge amount of data in the blockchain is very costly. To tackle this issue, an external data storage, named as interplanetary file system (IPFS), is used. Furthermore, for ensuring data security in IPFS, AES 128-bit is used, which performs better than the existing encryption schemes. Moreover, a huge computational cost is required using a proof of work consensus mechanism to validate transactions. To solve this issue, proof of authority (PoA) consensus mechanism is used in the proposed model. The simulation results are carried out, which show the efficiency and effectiveness of the proposed system model. The DDR-LEACH is compared with LEACH and the simulation results show that DDR-LEACH outperforms LEACH in terms of energy consumption, throughput, and improvement in network lifetime with CH selection mechanism. Moreover, transaction cost is computed, which is reduced by PoA during data storage on IPFS and service provisioning. Furthermore, the time is calculated in the comparison of AES 128-bit scheme with existing scheme. The formal security analysis is performed to check the effectiveness of smart contract against attacks. Additionally, two different attacks, MITM and Sybil, are induced in our system to show our system model's resilience against cyber attacks.Entities:
Keywords: LEACH protocol; authentication; blockchain; clustering; interplanetary file system; malicious node detection; security; service provisioning
Mesh:
Year: 2022 PMID: 35271119 PMCID: PMC8915012 DOI: 10.3390/s22051972
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Related work.
| Limitations Already Addressed | Contributions Already Provided | Validations Already Done | Limitations to be Addressed |
|---|---|---|---|
| Data security and data privacy, huge energy consumption of resources, low computation power of resources, nodes’ authentication, trust issue [ | Decentralized blockchain, public key infrastructure for resolving trust issue, nodes’ authentication | Reputation level | Authors will evaluate all parts of authentication process |
| Malicious nodes’ detection, malicious nodes’ traceability [ | Trust mechanism, consortium blockchain | Sensor nodes’ data input and output parameters, credit of sensors | PoW uses more computational power, no reward for sink nodes |
| Mobile nodes’ management, data protection [ | Uncertainty principle, Voronoi cell architecture, Blockchain | Network lifetime, energy consumption, average end-to-end delay, packet delivery ratio | No storage mechanism, no registration and authentication |
| No encryption and certificate scheme, nodes’ authentication [ | Blockchain, SHA 64-bit algorithm, crypto based authentication | Security analysis | Node battery issue, storage issue |
| Node authentication, security issue, centralized system [ | Hybrid structure is performed, Keccak hash function, consortium blockchain | Security analysis | PoA should be used for each validation and private blockchain |
| Data latency, limited data bandwidth, data security [ | Blockchain based SDN, PoA, Argan2 | Transactions per second, average time per block, latency | PoW consumes more computational power |
| Trust issue, central authority, gray hole and black hole attacks in an untrusted network [ | Blockchain based routing protocol for route establishment, reward to minimize selfish behavior | Route overhead, packet delivery ratio, gray hole attack, black hole attack | Proposed solution must be used for ad-hoc network |
| Data privacy, untrusted nodes [ | Decentralized blockchain based authentication scheme | Energy consumption | N/A |
| PoW takes more computational power [ | Blockchain incentive mechanism, SHA-256 | Pairing is performed by the hyper elliptic curve for the finite field | Proof of retrievability is used for recovering data in less time |
| Computationally extensive PoW-based mining [ | Computation offloading mechanism | Net revenue of computing, average delay | Try different consensus mechanisms |
| Single point of failure, data storage [ | Block offloading filter, blockchain | Comparison of PoW and synergistic multiple proof | N/A |
| Data storage, slow information validation in blockchain [ | Blockchain distributed ledger, Tangle based technology to minimize computational time | Age of information vs sampling interval, processing power vs sampling interval | N/A |
| Data transparency [ | Decentralized blockchain | Probability of attack detection by system, falsification attack, authentication delay and probabilistic scenario | No routing path is defined in order to reach the manager |
| No data privacy protection [ | Blockchain-based privacy protection mechanism, double SHA-256 | Data about noise | Scaled experimental data will be collected for better and complete judgment, algorithm will be improved for better result |
| Data privacy and data security [ | Information centric network, public key cryptographic scheme, two-tier structure, SHA-1 | Processing time, response time | Scheme should be used as practical implementation |
| Localization, network security [ | Decentralized blockchain-based trust management model | Energy consumption, localization error, average error ratio | Dynamic behavior of nodes |
| Nonrepudiation [ | Nonrepudiation mechanism, homomorphic hash function | Transaction latency, throughput, gas consumption | No user authentication, double spending |
| Malicious nodes’ detection, data security [ | Trust aware routing algorithm | Time complexity, throughput | No authentication mechanism |
Mapping between limitations, solutions, and validations.
| Limitations Identified | Solutions Proposed | Validations Done |
|---|---|---|
| L1. Nodes are not authenticated [ | S1. Authentication mechanism | V1. Message size, as shown in Figure 3 |
| L3. Inefficient energy consumption [ | S2. CHs’ selection considering nodes’ residual energy, minimum distance from BS and degree | V3. Energy consumption, as depicted in Figure 5 |
| L4. High computational cost [ | S3. PoA | V6. Average transaction cost, as shown in Figure 8 |
| L5. Costly data storage [ | S4. IPFS | V7. Average transaction cost, as shown in Figure 9 |
Figure 1Blockchain based nodes’ authentication and CHs’ selection in IoST.
Figure 2Interaction of buyers with IPFS.
Simulation parameters.
| Parameters | Value of Parameters |
|---|---|
| Sensing area | 100 × 100 m2 |
| Deployment | Random |
| Total nodes | 100 |
| CHs | 4 |
| BSs | 2 |
| Network interface | Wireless |
Figure 3Message size.
Figure 4Transaction cost during registration and authentication of nodes.
Figure 5Energy consumption.
Figure 6Network throughput.
Figure 7Network lifetime.
Figure 8Average transaction cost for service provisioning.
Figure 9Average transaction cost for data storage in IPFS.
Figure 10Comparison of execution time for AES and RSA.
Figure 11Security analysis of attacks with the proposed solution in terms of energy consumption.
Figure 12Security analysis of attacks with the proposed solution in terms of throughput.
Figure 13Security analysis of attacks with the proposed solution in terms of network lifetime.
Figure 14Security analysis of smart contract during registration and authentication of nodes.