Abstract
The wireless sensor networks are very vulnerable environments for network attacks, so that they require appropriate security measures must be implemented. The blockchain technology is an effective way of protecting data handled and possessed by the wireless sensor networks. Many of the existing approaches are following conventional security approaches. But such traditional approaches are very prone to failures of the nodes more often. In this paper, a novel efficient approach for authentication in wireless sensor networks that uses blockchain technology for security. The nodes of the wireless sensor networks are from IoT network and they are being formulated by the base station, cluster heads and normal sensor nodes. The building of a blockchain network will shape a hierarchical blockchain model, including small chain and global chain, among various network nodes. Nodes in this hybrid model in different communication situations, identity secure connection is realized, normal node identification user authentication is in the blockchain network, local block chain technology and selected cluster node identification verification is done. Analyzation of the protection and results demonstrate that there is robust protection and higher results in the system. The experimental results are showing that the computational capability of over 300 bytes per phase has been achieved using the proposed approach.
Similar content being viewed by others
References
Cui, Z., Sun, B., Wang, G., Xue, Y., & Chen, J. (2017). A novel oriented cuckoo search algorithm to improve dv-hop performance for cyber–physical systems. Journal of Parallel and Distributed Computing, 103, 42–52.
Amin, R., Islam, S. K. H., Kumar, N., & Choo, K. K. R. (2018). An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. Journal of Network and Computer Applications, 104, 133–144.
Cui, Z., Cao, Y., Cai, X., Cai, J., & Chen, J. (2019). Optimal leach protocol with modified bat algorithm for big data sensing systems in internet of things. Journal of Parallel and Distributed Computing, 132, 217–229.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.
Khan, M. A., & Salah, K. (2017). Iot security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 83, 395–411.
Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737.
Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication protocols for internet of things: A comprehensive survey. Security and Communication Networks, 6, 562–953.
Ferrag, M. A., Maglaras, L., & Ahmim, A. (2017). Privacy-preserving schemes for ad hoc social networks: A survey. IEEE Communications Surveys & Tutorials, 19(4), 3015–3045.
Biswas, S., Sharif, K., Li, F., Nour, B., & Wang, Y. (2019). A scalable blockchain framework for secure transactions in iot. IEEE Internet of Things Journal, 6(3), 4650–4659.
Huang, J., Kong, L., Chen, G., Wu, M.-Y., Liu, X., & Zeng, P. (2019). Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Transactions on Industrial Informatics, 15(6), 3680–3689.
Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.-Y. (2019). Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
Liu, M., Yu, F. R., Teng, Y., Leung, V. C. M., & Song, M. (2019). Distributed resource allocation in blockchain-based video streaming systems with mobile edge computing. IEEE Transactions on Wireless Communications, 18(1), 695–708.
Cai, X., Gao, X.-Z., & Xue, Y. (2016). Improved bat algorithm with optimal forage strategy and random disturbance strategy. International Journal of Bio-Inspired computation, 8(4), 205–214.
Deng, X., Jiang, P., Peng, X., & Mi, C. (2019). An intelligent outlier detection method with one class support tucker machine and genetic algorithm toward big sensor data in internet of things. IEEE Transactions on Industrial Electronics, 66(6), 4672–4683.
Cai, X., Wang, H., Cui, Z., Cai, J., Xue, Y., & Wang, L. (2018). Bat algorithm with triangle-flipping strategy for numerical optimization. International Journal of Machine Learning and Cybernetics, 9(2), 199–215.
Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., & Zhang, Z. (2018). Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Transactions on Intelligent Transportation Systems, 19(7), 2204–2220.
Cui, Z., Xue, F., Cai, X., Cao, Y., Wang, G.-G., & Chen, J. (2018). Detection of malicious code variants based on deep learning. IEEE Transactions on Industrial Informatics, 14(7), 3187–3196.
Cao, Y., Ding, Z., Xue, F., & Rong, X. (2018). An improved twin support vector machine based on multi-objective cuckoo search for software defect prediction. International Journal of Bio-InspiredComputation, 11(4), 282–291.
Zhang, M., Wang, H., Cui, Z., & Chen, J. (2018). Hybrid multi-objective cuckoo search with dynamical local search. Memetic Computing, 10(2), 199–208.
Cui, Z., Xue, F., Zhang, S., Cai, X., Cao, Y., Zhang, W., Chen, J. (2019). A Hybrid BlockChain-based identity authentication scheme for multi-WSN. IEEE Transactions on Service Computing.
Sarpatwar, K. K., Ganapavarapu, V. S., Shanmugam, K., Rahman, A., Vacul, R. (2019). Blockchain enabled AI marketplace: The price you pay for trust. In IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2019, Long Beach,CA, USA, June 16–20, 2019.
Cui, Z., Zhang, J., Wang, Y., Cao, Y., Cai, X., Zhang, W., & Chen, J. (2019). A pigeon-inspired optimization algorithm for many-objective optimization problems. Science China Information Sciences, 62(070), 2121–2123.
Reyna, A., Martin, C., Chen, J., Soler, E., & Diaz, M. (2018). Onblockchain and its integration with iot. challenges and opportunities. Future Generation Computer Systems, 88, 173–190.
Khan, M. A., & Salah, K. (2018). Iot security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.
Pan, J., Wang, J., Hester, A., Alqerm, I., Liu, Y., & Zhao, Y. (2019). Edgechain: An edge-iot framework and prototype based on blockchain and smart contracts. IEEE Internet of Things Journal, 6(3), 4719–4732.
Mubarakali, A., Bose, S. C., Srinivasan, K., et al. (2019). Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01420-0.
Acknowledgements
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through the General Research Project under grant number (R.G.P.1/200/41). I would like to thank King Khalid university for the necessary support to lead this paper, we thank our colleagues who sustained greatly assisted this research. We would also like to show our gratitude for sharing their pearls of wisdom with us during this research, and we thank “anonymous” reviewers for their so-called insights.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author declares that they no conflict of interest. The author of this research acknowledge that they are not involved in any financial interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mubarakali, A. An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks. Wireless Pers Commun 127, 255–269 (2022). https://doi.org/10.1007/s11277-021-08212-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08212-w