An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks

被引:29
|
作者
Mubarakali, Azath [1 ]
机构
[1] King Khalid Univ, Coll Comp Sci, Abha, Saudi Arabia
关键词
Blockchain; WSN; Authentication; IoT; Authorization;
D O I
10.1007/s11277-021-08212-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The wireless sensor networks are very vulnerable environments for network attacks, so that they require appropriate security measures must be implemented. The blockchain technology is an effective way of protecting data handled and possessed by the wireless sensor networks. Many of the existing approaches are following conventional security approaches. But such traditional approaches are very prone to failures of the nodes more often. In this paper, a novel efficient approach for authentication in wireless sensor networks that uses blockchain technology for security. The nodes of the wireless sensor networks are from IoT network and they are being formulated by the base station, cluster heads and normal sensor nodes. The building of a blockchain network will shape a hierarchical blockchain model, including small chain and global chain, among various network nodes. Nodes in this hybrid model in different communication situations, identity secure connection is realized, normal node identification user authentication is in the blockchain network, local block chain technology and selected cluster node identification verification is done. Analyzation of the protection and results demonstrate that there is robust protection and higher results in the system. The experimental results are showing that the computational capability of over 300 bytes per phase has been achieved using the proposed approach.
引用
收藏
页码:255 / 269
页数:15
相关论文
共 50 条
  • [31] Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks
    Gnana Kousalya Chella Thevar
    G. Rohini
    Wireless Networks, 2017, 23 : 1479 - 1489
  • [32] An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks
    Xiong, Ling
    Xiong, Naixue
    Wang, Changyuan
    Yu, Xinqiao
    Shuai, Mengxia
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (09): : 5626 - 5638
  • [33] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1070 - 1081
  • [34] Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
    Jung, Jaewook
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    SENSORS, 2017, 17 (03)
  • [35] RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks
    Singh D.
    Kumar B.
    Singh S.
    Chand S.
    Singh P.K.
    Personal and Ubiquitous Computing, 2024, 28 (01) : 171 - 192
  • [36] An energy efficient authentication scheme for cluster-based wireless IoT sensor networks
    Phalaagae, Pendukeni
    Zungeru, Adamu Murtala
    Sigweni, Boyce
    Rajalakshmi, Selvaraj
    Batte, Herbet
    Eyobu, Odongo S.
    SCIENTIFIC AFRICAN, 2024, 25
  • [37] Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
    Srinivas, Jangirala
    Mukhopadhyay, Sourav
    Mishra, Dheerendra
    AD HOC NETWORKS, 2017, 54 : 147 - 169
  • [38] Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks
    Thevar, Gnana Kousalya Chella
    Rohini, G.
    WIRELESS NETWORKS, 2017, 23 (05) : 1479 - 1489
  • [39] An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks
    Delgado-Mohatar, Oscar
    Sierra, Jose M.
    Brankovic, Ljiljana
    Fuster-Sabater, Amparo
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 332 - +
  • [40] On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
    Lu, Jian-zhu
    Zhou, Jipeng
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,