A blockchain-empowered authentication scheme for worm detection in wireless sensor network

被引:14
作者
Chen, Yuling [1 ]
Yang, Xiong [1 ]
Li, Tao [1 ]
Ren, Yi [2 ]
Long, Yangyang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Univ East Anglia, Sch Comp Sci, Norwich NR5 7TJ, England
关键词
Wireless Sensor Network (WSN); Node authentication; Blockchain; Tangle; Worm detection; INTRUSION DETECTION; INTERNET;
D O I
10.1016/j.dcan.2022.04.007
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless Sensor Network (WSN) is a distributed sensor network composed a large number of nodes with low cost, low performance and self-management. The special structure of WSN brings both convenience and vulnerability. For example, a malicious participant can launch attacks by capturing a physical device. Therefore, node authentication that can resist malicious attacks is very important to network security. Recently, blockchain technology has shown the potential to enhance the security of the Internet of Things (IoT). In this paper, we propose a Blockchain-empowered Authentication Scheme (BAS) for WSN. In our scheme, all nodes are managed by utilizing the identity information stored on the blockchain. Besides, the simulation experiment about worm detection is executed on BAS, and the security is evaluated from detection and infection rate. The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
引用
收藏
页码:265 / 272
页数:8
相关论文
共 35 条
  • [1] AbuHmed T, 2009, GLOB TELECOMM CONF, P4680
  • [2] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [3] PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs
    Chen, Yuling
    Sun, Jing
    Yang, Yixian
    Li, Tao
    Niu, Xinxin
    Zhou, Huiyu
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (02) : 1204 - 1221
  • [4] A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN
    Cui, Zhihua
    Xue, Fei
    Zhang, Shiqiang
    Cai, Xingjuan
    Cao, Yang
    Zhang, Wensheng
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) : 241 - 251
  • [5] Engi H, 2002, Survey on Transitive Signature Schemes, P6
  • [6] Feng LB, 2018, INT C COMP SUPP COOP, P75, DOI 10.1109/CSCWD.2018.8465319
  • [7] [高政风 Gao Zhengfeng], 2020, [软件学报, Journal of Software], V31, P1124
  • [8] Granjal J., 2013, 2013 IFIP NETW C, P1
  • [9] Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
    Hammi, Mohamed Tahar
    Hammi, Badis
    Bellot, Patrick
    Serhrouchni, Ahmed
    [J]. COMPUTERS & SECURITY, 2018, 78 : 126 - 142
  • [10] Hammi MT, 2018, IEEE WCNC, DOI 10.1109/ICTON.2018.8473771