An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks

被引:29
|
作者
Mubarakali, Azath [1 ]
机构
[1] King Khalid Univ, Coll Comp Sci, Abha, Saudi Arabia
关键词
Blockchain; WSN; Authentication; IoT; Authorization;
D O I
10.1007/s11277-021-08212-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The wireless sensor networks are very vulnerable environments for network attacks, so that they require appropriate security measures must be implemented. The blockchain technology is an effective way of protecting data handled and possessed by the wireless sensor networks. Many of the existing approaches are following conventional security approaches. But such traditional approaches are very prone to failures of the nodes more often. In this paper, a novel efficient approach for authentication in wireless sensor networks that uses blockchain technology for security. The nodes of the wireless sensor networks are from IoT network and they are being formulated by the base station, cluster heads and normal sensor nodes. The building of a blockchain network will shape a hierarchical blockchain model, including small chain and global chain, among various network nodes. Nodes in this hybrid model in different communication situations, identity secure connection is realized, normal node identification user authentication is in the blockchain network, local block chain technology and selected cluster node identification verification is done. Analyzation of the protection and results demonstrate that there is robust protection and higher results in the system. The experimental results are showing that the computational capability of over 300 bytes per phase has been achieved using the proposed approach.
引用
收藏
页码:255 / 269
页数:15
相关论文
共 50 条
  • [21] A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks
    Xu, Lin
    Wen, Mi
    Li, Jinguo
    2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 200 - 204
  • [22] Security and authentication scheme for hierarchical wireless sensor networks
    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
    不详
    Dongnan Daxue Xuebao, 2008, SUPPL. 1 (243-248): : 243 - 248
  • [23] A dynamic User Authentication scheme for wireless sensor networks
    Wong, Kirk H. M.
    Zheng, Yuan
    Cao, Jiannong
    Wang, Shengwei
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 244 - +
  • [24] BAS: The Biphase Authentication Scheme for Wireless Sensor Networks
    Riaz, Rabia
    Chung, Tae-Sun
    Rizvi, Sanam Shahla
    Yaqub, Nazish
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [25] A Lightweight User Authentication Scheme Based on Fuzzy Extraction Technology for Wireless Sensor Networks
    Dong, Rui-Hong
    Ren, Bu-Bu
    Zhang, Qiu-Yu
    Yuan, Hui
    International Journal of Network Security, 2021, 23 (01) : 157 - 171
  • [26] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    Peer-to-Peer Networking and Applications, 2015, 8 : 1070 - 1081
  • [27] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [28] An efficient mutual authentication and key agreement scheme without password for wireless sensor networks
    Yulei Chen
    Jianhua Chen
    The Journal of Supercomputing, 2021, 77 : 13653 - 13675
  • [29] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [30] Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks
    Gnana Kousalya Chella Thevar
    G. Rohini
    Wireless Networks, 2017, 23 : 1479 - 1489