Abstract
A novel blockchain technology aided peer-to-peer connection (P2P)-based access control protocol is proposed for the distributed ad hoc networks. More specifically, the access process conceived can improve the security performance as an explicit advantage of blockchain technology, which is capable of preventing from the security threatens, e.g., being eavesdropped, being tampered, and malicious access imposed by the lack of the authentication center and the nature of the multi-hop routing. Meanwhile, a reasonable punishment mechanism is integrated into the access protocol that reinforces punishment upon the increase of dishonest or malicious node behaviors and hence, is particularly beneficial for the robustness of the long-term systems. Furthermore, a low-complexity match scheme based on competition access (MCA) is utilized for designing the appropriate multi-hop routings, which considers the min-max delay optimization objective. Numerical results demonstrate that the blockchain-aided access control protocol achieves the lower delay in comparison to the conventional first come, first serve access scheme, random access scheme, and the single-hop access scheme, while improving the security performance of access process in ad hoc networks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chen, S., Zhao, J.: The requirements, challenges, and technologies for 5G of terrestrial mobile telecommunication. IEEE Commun. Mag. 52(5), 36–43 (2014)
Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun. 6(2), 46–55 (1999)
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Hartenstein, H., Laberteaux, L.P.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6), 164–171 (2008)
Akyildiz, I.F., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), S23–S30 (2005)
Borgia, E.: The internet of things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)
Bagaria, V., Kannan, S., Tse, E.A.D.: Deconstructing the blockchain to approach physical limits (2018). https://arxiv.org/abs/1810.08092v1
Gao, Y., Xiao, Y., Wu, M., Xiao, M., Shao, J.: Dynamic social-aware peer selection for cooperative relay management with D2D communications. IEEE Trans. Commun. 67(5), 3124–3139 (2019)
Acknowledgements
This work was supported in part by the National Science Foundation of China under Grant number 61671131, the Fundamental Research Funds for the Central Universities (No. ZYGX2018J092), and Sichuan Science and Technology Program (2018HH0138).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wu, M., Gao, Y., Xiao, Y. (2019). Blockchain-Aided Access Control for Secure Communications in Ad Hoc Networks. In: Zheng, J., Li, C., Chong, P., Meng, W., Yan, F. (eds) Ad Hoc Networks. ADHOCNETS 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 306. Springer, Cham. https://doi.org/10.1007/978-3-030-37262-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-37262-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37261-3
Online ISBN: 978-3-030-37262-0
eBook Packages: Computer ScienceComputer Science (R0)