Secure IoT Architecture in Mobile Ad-hoc Network Against Malicious Attacks Using Blockchain-based BATMAN

被引:0
作者
Khandelwal, Neha [1 ]
Gupta, Hashikant [1 ]
机构
[1] ITM Univ, Dept Comp Sci Engn, Gwalior, India
来源
INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES | 2022年 / 13卷 / 06期
关键词
Internet of things; Wireless Network; Byzantine fault tolerance; Blockchain technology; Trust management; Extended-BATMAN (EBATMAN);
D O I
10.14456/ITJEMAST.2022.123
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
It is possible to build a decentralised wireless network using Internet of Things (IoT) sensors and other IoT-based devices. Wireless connections allow all network nodes to be moved around at will. They can connect and construct a network without current network infrastructure. Using blockchain technology in a wireless ad-hoc context, an IoT-based MANET is a fresh research topic. The key challenge for ad-hoc blockchain applications is to cope with the high computational cost of block validation while keeping blockchain features and incorporating nodes. This article presents a blockchain-based mobile network as a potential application of the ensemble approach, which has been covered in other articles. The suggested technique for MANETS routing uses the Byzantine Fault Tolerance (BFT) protocol. It is possible to integrate Blockchain into an IoT-based MANET (BATMAN) using advanced mobile ad-hoc networking (MANET) (BATMAN). Extended-BATMAN (E-BATMAN) is a method of integrating blockchain technology into the BATMAN protocol using IoT-based MANETs. Blockchain is a safe, distributed, and trustworthy platform, with each node performing its security procedures. Four characteristics are used to evaluate the proposed ensemble method: pdr, average e2e latency, network throughput, and algorithm vitality use. All of these components outperform the existing traditional techniques using the recommended ensemble approach. Disciplinary: Information Technology. (C) 2022 INT TRANS J ENG MANAG SCI TECH.
引用
收藏
页数:15
相关论文
共 21 条
[1]   RBFT: Redundant Byzantine Fault Tolerance [J].
Aublin, Pierre-Louis ;
Ben Mokhtar, Sonia ;
Quema, Vivien .
2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, :297-306
[2]  
Clausen T., 2003, Rfc3626: Optimized link state routing protocol (olsr)
[3]   Blockgraph: A blockchain for mobile ad hoc networks [J].
Cordova, David ;
Laube, Alexandre ;
Thi-Mai-Trang Nguyen ;
Pujolle, Guy .
2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
[4]  
Dennis R, 2015, INT CONF INTERNET, P131, DOI 10.1109/ICITST.2015.7412073
[5]  
Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47
[6]   CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes [J].
Hernandez-Orallo, Enrique ;
Serrat Olmos, Manuel David ;
Cano, Juan-Carlos ;
Calafate, Carlos T. ;
Manzoni, Pietro .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (06) :1162-1175
[7]  
Johnson D., 2008, 2 IFIP INT S WIRELES
[8]  
Kannhavong B, 2006, ISCN '06: PROCEEDINGS OF THE 7TH INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORKS, P30
[9]  
Kotla R, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P575
[10]  
Kulla E., 2011, 2011 International Conference on Broadband, Wireless Computing, Communication and Applications, P159, DOI 10.1109/BWCCA.2011.28