Blockchain-Based Secured LEACH Protocol (BSLEACH)

被引:0
作者
Ajay, Shubham Kant [1 ]
Sinha, Ditipriya [2 ]
Vikram, Raj [3 ]
Das, Ayan Kumar [4 ]
Prasad, Ramjee [5 ]
机构
[1] IIT Patna, Dept Comp Sci & Engn, Patna 801106, Bihar, India
[2] NIT Patna, Dept Comp Sci & Engn, Patna 800014, Bihar, India
[3] CV Raman Global Univ, Dept Comp Sci & Engn, Bhubaneswar 752054, Odhisa, India
[4] Birla Inst Technol, Dept Comp Sci & Engn, Patna 800014, Bihar, India
[5] Aarhus Univ, Dept Business Dev & Technol, Aarhus Ctr, Nordre Ringgade 1, DK-8000 Aarhus, Denmark
关键词
Wireless sensor network; LEACH; Cluster head; Blockchain; Registration; Authentication; Malicious node identification;
D O I
10.1007/s11277-024-11546-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In Wireless Sensor Networks (WSNs), malicious nodes can infiltrate the network at any time, compromising network performance. Developing a secure routing protocol is critical for ensuring reliable data transmission. LEACH (Low-Energy Adaptive Clustering Hierarchy) is a well-established hierarchical routing protocol within the WSN paradigm. However, LEACH lacks robustness against security attacks due to the absence of integrated security mechanisms, making it vulnerable in the presence of malicious nodes. On the other hand, Blockchain, an emerging technology, is best suited for Wireless Sensor Networks due to its distributed, decentralized, immutable, and traceability features. Integrating blockchain with WSNs significantly enhances security, data integrity, and decentralization within the network. Integrating blockchain technology with WSNs significantly enhances security, data integrity, and decentralization within the network. In this paper, we introduce a Blockchain-enabled secure LEACH protocol to ensure reliable data transmission in wireless sensor networks. The proposed hybrid blockchain framework includes three phases: Registration, Authentication, and Malicious Node Detection. By utilizing the autonomous execution capabilities of smart contracts without third-party intervention, we develop specific smart contracts for the registration of cluster heads and ordinary nodes, for authentication between cluster heads and their corresponding ordinary nodes, and for the identification and elimination of malicious cluster head nodes. A detailed security analysis of the proposed BSLEACH framework is provided to provide its robustness against different network attacks such as Man-in-the-Middle attack, Sybil attack, Replay attack and non-repudiation.In performance evaluation, it is observed that the proposed Blockchain-based Secured LEACH (BSLEACH) protocol outperforms other versions of LEACH such as Sleach (Secure low-energy adaptive clustering hierarchy) and Ms-leach (A routing protocol combining multi-hop transmissions and Single-hop transmissions) in the presence of malicious cluster heads and Sybil nodes in the network. The proposed solution improves the performance of the traditional LEACH protocol by identifying and removing malicious Cluster head units from the Private Blockchain network.
引用
收藏
页码:1055 / 1097
页数:43
相关论文
共 32 条
[31]   A Survey of Sybil Attack Countermeasures in Underwater Sensor and Acoustic Networks [J].
Zukarnain, Zuriati Ahmad ;
Amodu, Oluwatosin Ahmed ;
Wenting, Cui ;
Bukar, Umar Ali .
IEEE ACCESS, 2023, 11 :64518-64543
[32]  
Zulu N., 2023, ARXIV