Efficient and secure routing protocol based on Blockchain approach for wireless sensor networks

被引:23
|
作者
Lazrag, Hilmi [1 ]
Chehri, Abdellah [2 ]
Saadane, Rachid [3 ]
Rahmani, Moulay Driss [1 ]
机构
[1] UM5, FSR, LRIT Lab, Dept Engn, Rabat, Morocco
[2] Univ Quebec Chicoutimi, Dept Appl Sci, Chicoutimi, PQ, Canada
[3] Hassania Sch Publ Works, SIRC LaGeS, EHTP Km 7 Route El Jadida, Oasis, Morocco
来源
关键词
Blockchain; digital signature; IoT; security; SINR; traffic load; WSN; ECONOMICS; BITCOIN;
D O I
10.1002/cpe.6144
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Embedded systems and wireless sensor networks (WSN) are found today in increasingly critical areas of applications. They have become integrated and embedded in nearly all aspects of everyday life, including manufacturing, healthcare, education, critical infrastructure, and entertainment. The number of connected devices continues to grow, and due to the insecure nature of these devices, the amount of risk continues to grow as well. These risks, however, can be mitigated with the creation and adoption of WSN security standards developed to create an environment of safety, security, and confidence in the technology. Designing the security policy for WSNs requires asking some preliminary questions. These questions are particularly important in the case of WSNs because their use is highly decentralized. Blockchain's ability on governing decentralized networks makes it especially suitable for designing a self-managing system on WSN devices. This article proposes a routing protocol that uses Blockchain technology to offer a shared memory between the network's nodes. The simulation results have shown that this solution could be applicable and could resolve the issues cited above.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks
    Deep Kumar Bangotra
    Yashwant Singh
    Arvind Selwal
    Nagesh Kumar
    Pradeep Kumar Singh
    Wireless Personal Communications, 2022, 127 : 1045 - 1066
  • [22] The research on certainty-based secure routing protocol in wireless sensor networks
    Yao Lan
    Zhao Zhibin
    Gao Fuxiang
    Yu Ge
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1177 - 1181
  • [23] A Hierarchical and Role Based Secure Routing Protocol for Mobile Wireless Sensor Networks
    Hiren Kumar Deva Sarma
    Avijit Kar
    Rajib Mall
    Wireless Personal Communications, 2016, 90 : 1067 - 1103
  • [24] A Hierarchical and Role Based Secure Routing Protocol for Mobile Wireless Sensor Networks
    Sarma, Hiren Kumar Deva
    Kar, Avijit
    Mall, Rajib
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (03) : 1067 - 1103
  • [25] A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks
    Bangotra, Deep Kumar
    Singh, Yashwant
    Selwal, Arvind
    Kumar, Nagesh
    Singh, Pradeep Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1045 - 1066
  • [26] Secure and Energy-Based STEERA Routing Protocol for Wireless Sensor Networks
    Ram, G. Mohan
    Ilavarasan, E.
    JOURNAL OF INTERCONNECTION NETWORKS, 2024, 24 (03)
  • [27] SECURE ENERGY EFFICIENT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
    Das, Ayan Kumar
    Chaki, Rituparna
    Dey, Kashi Nath
    FOUNDATIONS OF COMPUTING AND DECISION SCIENCES, 2016, 41 (01) : 3 - 27
  • [28] A Hierarchical Secure Reliable Routing Protocol for Wireless Sensor Networks
    Zhang, Zhiming
    Chen, Deqiao
    Jiang, Changgen
    SENSOR LETTERS, 2011, 9 (04) : 1561 - 1565
  • [29] Choice of Secure Routing Protocol for Applications in Wireless Sensor Networks
    Du, Jiang
    Peng, Su
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 470 - 473
  • [30] A Secure Anonymous Path Routing Protocol for Wireless Sensor Networks
    Zhang, Zhiming
    Jiang, Changgen
    Deng, Jiangang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 2, 2010, : 415 - +