scholarly journals Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 411
Author(s):  
Saba Awan ◽  
Nadeem Javaid ◽  
Sameeh Ullah ◽  
Asad Ullah Khan ◽  
Ali Mustafa Qamar ◽  
...  

In this paper, an encryption and trust evaluation model is proposed on the basis of a blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) are stored. The authentication of ANs and SNs is performed in public and private blockchains, respectively. However, inauthentic nodes utilize the network’s resources and perform malicious activities. Moreover, the SNs have limited energy, transmission range and computational capabilities, and are attacked by malicious nodes. Afterwards, the malicious nodes transmit wrong information of the route and increase the number of retransmissions due to which the SNs’ energy is rapidly consumed. The lifespan of the wireless sensor network is reduced due to the rapid energy dissipation of the SNs. Furthermore, the throughput increases and packet loss increase with the presence of malicious nodes in the network. The trust values of SNs are computed to eradicate the malicious nodes from the network. Secure routing in the network is performed considering residual energy and trust values of the SNs. Moreover, the Rivest–Shamir–Adleman (RSA), a cryptosystem that provides asymmetric keys, is used for securing data transmission. The simulation results show the effectiveness of the proposed model in terms of high packet delivery ratio.

Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 165 ◽  
Author(s):  
Qiong Shi ◽  
Li Qin ◽  
Yinghua Ding ◽  
Boli Xie ◽  
Jiajie Zheng ◽  
...  

Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm.


2021 ◽  
Author(s):  
Jenice Prabu A ◽  
Hevin Rajesh D

Abstract In Wireless sensor network, the major issues are security and energy consumption. There may be several numbers of malicious nodes present in sensor networks. Several techniques have been proposed by the researchers to identify these malicious nodes. WSNs contain many sensor nodes that sense their environment and also transmit their data via multi-hop communication schemes to the base station. These sensor nodes provides power supply using battery and the energy consumption of these batteries must be low. Securing the data is to avoid attacks on these nodes and data communication. The aggregation of data helps to minimize the amount of messages transmitted within the network and thus reduces overall network energy consumption. Moreover, the base station may distinguish the encrypted and aggregated data based on the encryption keys during the decryption of the aggregated data. In this paper, two aspects of the problem is concerned, we investigate the efficiency of data aggregation: first, how to develop cluster-based routing algorithms to achieve the lowest energy consumption for aggregating data, and second, security issues in wsn. By using Network simulator2 (NS2) this scheme is simulated. In the proposed scheme, energy consumption, packet delivery ratio and throughput is analyzed. The proposed clustering, routing, and protection protocol based on the MCSDA algorithm shows significant improvement over the state-of - the-art protocol.


2013 ◽  
Vol 373-375 ◽  
pp. 1931-1934 ◽  
Author(s):  
Yi Min Zhou ◽  
La Yuan Li

The Wireless Sensor Network applications has widely been used over the last few years. WSN is a novel self-organization wireless network which is made up of randomly distributed sensor Nodes. Due to some resource constraints, the design of security in WSN encounters a great many of new challenges. It is vulnerable to attack, which is harmful for availability of WSN. In this paper we propose a trust-aware and location-based secure routing protocol which protects WSN against routing attacks, and also supports large-scale WSN deployments. The proposed protocol is extended from GPSR protocol, which imports security mechanism that depends on a distributed trust management system. The solution has been shown to efficiently detect and avoid malicious nodes.


Wireless Sensor Network (WSN) is developed extremely because of their low installation cost and various applications. WSN has compact and inexpensive sensor nodes for monitoring the physical environment. WSNs are susceptible to many attacks (e.g. malicious nodes) because of its distinct characteristics. The performance of node and network is affected by the malicious nodes. Moreover, the communication among the sensor nodes also required to be secured for preventing the data from the hackers. In this paper, the architecture of the WSN is generated by using the Fuzzy-C-Means clustering (FCM). Then the detection of the malicious nodes is performed by using the Acknowledgement Scheme (AS). This AS is integrated in the Ant Colony Optimization (ACO) based routing for avoiding the malicious nodes while generating the route from the source to the Base Station (BS). Then the Hybrid Encryption Algorithm (HEA) is used for performing the secure data transmission through the network and this proposed method is named as HEA-AS. The performance of the HEA-AS method is evaluated in terms of End to End Delay (EED), network lifetime, throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR). The proposed HEA-AS method is compared with the existing method called as CTCM to evaluate the effectiveness of the HEA-AS method.


Secure and reliable routing expands the performance of wireless communication infrastructure of the Advanced Metering Infrastructure (AMI).This paper tries to deliver reliable routing using combination of AODV(Reactive type protocol) and DSDV(proactive type protocol) protocol considering WSN. Different kinds of Attack annoys the enactment of communication infrastructure of AMI. This paper defends communication infrastructure from DoS (Denial of service) attack. The main aim of this paper try to provide reliable routing with security. Communication infrastructure is a key element of AMI. Providing reliability and security for communication infrastructure we can improve the performance of AMI. Due to this electricity sector can save millions of dollars and we provide social awareness about importance of electricity security or Smart Grid. This paper calculates the security in terms of delay, energy consumption, throughput, PDR (Packet Delivery Ratio) and overhead. By considering these parameters we will calculate Confidentiality, Integrity, Availability and Accountability (non- repudiation). Wireless Sensor Network (WSN) considered for wireless communication infrastructure for the AMI. Sensor nodes are battered for attack. Intended for AODSD2V2 (Ad Hoc on Demand Destination Sequenced Distance Vector Routing Protocol) protects the data packets from malicious nodes and DoS attack. For the WSN network infrastructure two kinds of topologies are considered 1. Random deployment strategy 2. Grid deployment. Network Simulator2 (NS2) delivers comparatively simulation results intended for the calculation of reliability and security.


2018 ◽  
Vol 14 (04) ◽  
pp. 211 ◽  
Author(s):  
Jinghua Zhu

Because the current research on wireless sensor networks is not thorough enough, with such shortcomings as lack of objectivity and insufficient accuracy of the trust evaluation model of network nodes, this paper proposes a trust evaluation model with multi-factor comprehensive consideration and Bayesian model, an improved trust evaluation model, by combining trust management mechanism, trust factor, fuzzy set and D-S evidence theory, solving factor singleness and imprecise evaluation in the original model. The simulation results show that the proposed model has good dynamic adaptability, higher detection rate and lower detection error rate, and it consumes less energy and improves the security of the network.


In a distributed Wireless Communication Technology, the Wireless Sensor Network (WSN) is a technology developing for sensing and performing different monitoring operations. The proposed algorithm dynamically partitions the Heterogeneous Wireless Sensor Network (HWSN) in to clusters. On the basis of initial energy, the cluster head (CH) is selected in the first round and residual energy with low draining rate protocol (RELDR) is used in the next round for selecting CH. The CH senses and aggregates the data, these summarized data is processed between the clusters and the link is maintained with the base station. Cluster Authority (CA) is a member node that acts as a supervising node which contains remove list and maintains the attacker information. The Technology Multiple Input and Multiple Output(MIMO) is used in the proposed system which reduces the noise in the signal and improves the network performance. During transmission, the unauthenticated nodes which are responsible for data leakage or any malicious activities are detected by the algorithm and information of these nodes are updated in the remove list of CA. The listed unauthenticated nodes or the black hole attack nodes in CA are removed from the network. The proposed algorithm removes the malicious nodes which are affecting the network performance and reconstructs the network by considering only the legitimate nodes. Experimental results will be analyzed for the network parameters like throughput, delay, energy and Packet delivery ratio and compared with the existing systems.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


2021 ◽  
Vol 11 (4) ◽  
pp. 1362
Author(s):  
Kohei Tomita ◽  
Nobuyoshi Komuro

This paper proposes a Duty-Cycle (DC) control method in order to improve the Packet Delivery Ratio (PDR) for IEEE 802.15.4-compliant heterogeneous Wireless Sensor Networks (WSNs). The proposed method controls the DC so that the buffer occupancy of sensor nodes is less than 1 and assigns DC to each sub-network (sub-network means a network consisting of a router node and its subordinate nodes). In order to use the appropriate DC of each sub-network to obtain the high PDR, this paper gives analytical expressions of the buffer occupancy. The simulation results show that the proposed method achieves a reasonable delay and energy consumption while maintaining high PDR.


2020 ◽  
Vol 17 (12) ◽  
pp. 5447-5456
Author(s):  
R. M. Alamelu ◽  
K. Prabu

Wireless sensor network (WSN) becomes popular due to its applicability in distinct application areas like healthcare, military, search and rescue operations, etc. In WSN, the sensor nodes undergo deployment in massive number which operates autonomously in harsh environment. Because of limited resources and battery operated sensor nodes, energy efficiency is considered as a main design issue. To achieve, clustering is one of the effective technique which organizes the set of nodes into clusters and cluster head (CH) selection takes place. This paper presents a new Quasi Oppositional Glowworm Swarm Optimization (QOGSO) algorithm for energy efficient clustering in WSN. The proposed QOGSO algorithm is intended to elect the CHs among the sensor nodes using a set of parameters namely residual energy, communication cost, link quality, node degree and node marginality. The QOGSO algorithm incorporates quasi oppositional based learning (QOBL) concept to improvise the convergence rate of GSO technique. The QOGSO algorithm effectively selects the CHs and organizes clusters for minimized energy dissipation and maximum network lifetime. The performance of the QOGSO algorithm has been evaluated and the results are assessed interms of distinct evaluation parameters.


Sign in / Sign up

Export Citation Format

Share Document