Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks †
<p>Proposed system model.</p> "> Figure 2
<p>(<b>a</b>) Packet delivery ratio, (<b>b</b>) throughput.</p> "> Figure 3
<p>(<b>a</b>) FPR and FNR, (<b>b</b>) detection accuracy.</p> "> Figure 3 Cont.
<p>(<b>a</b>) FPR and FNR, (<b>b</b>) detection accuracy.</p> "> Figure 4
<p>(<b>a</b>) Number of dead nodes with rounds, (<b>b</b>) residual energy of the nodes.</p> "> Figure 5
<p>(<b>a</b>) Processing time of trust evaluation, (<b>b</b>) processing time of RSA encryption.</p> "> Figure 6
<p>Energy consumption in trust evaluation of nodes.</p> "> Figure 7
<p>(<b>a</b>) Comparison of gas consumption between PoA and PoW, (<b>b</b>) comparison of average transaction latency between PoA and PoW.</p> "> Figure 7 Cont.
<p>(<b>a</b>) Comparison of gas consumption between PoA and PoW, (<b>b</b>) comparison of average transaction latency between PoA and PoW.</p> "> Figure 8
<p>Formal analysis of smart contract using Oyente.</p> "> Figure 9
<p>Dead nodes with and without attacks.</p> "> Figure 10
<p>Residual energy with and without attacks.</p> "> Figure 11
<p>PDR with and without attacks.</p> ">
Abstract
:1. Introduction
- The malicious SNs in the network are identified considering three factors: Forwarding Rate (FR), Response Time (RT) and Delayed Transmission (DT).
- A routing mechanism is proposed that ensures real time and energy efficient data delivery from SNs to BSs. The ANs act as relay nodes in the data delivery.
- Secure and reliable data delivery is ensured using the RSA technique.
2. Related Work
2.1. Trust Evaluation of Sensor Nodes
2.2. Nodes’ Authentication
2.3. Secure Routing in Networks
2.4. Lightweight Blockchain
2.5. Data Storage
Problems Already Addressed | Solutions Already Proposed | Validations Already Done | Problems to Be Addressed | C1 | C2 | C3 |
---|---|---|---|---|---|---|
Incorrect location estimation and energy dissipation | Node’s trust values are based on data based and behavioral based trust [10] | False Positive Rate (FPR), Detection Accuracy (DA), False Negative Rate (FNR), localization error, energy consumption | Malicious node detection consumes high computational cost. Due to indirect trust evaluation, nodes act maliciously | × | √ | × |
Existing models do not allow content access, reliable authentication and trust management | Blockchain authentication and trust module attains authentication and trust via digital signature [18] | N/A | Weak hashing algorithm. Poor authentication, malicious nodes tamper with the data | √ | × | × |
No traceability mechanism of nodes’ data fairness | BTM for malicious node detection is proposed which ensures traceability and transparency [19] | Security, traceability and reliability analysis | PoW requires high energy and faster computer processing to solve cryptographic puzzles that make it costly | × | √ | × |
SNs captured by malicious nodes broadcast inaccurate localization | Range free algorithm is proposed for secure localization [20] | Average localization error, localization error variance | Large communications overhead, consumes more energy due to the dynamic behavior of SNs | × | √ | × |
Security threats arise in IoT platform | IoT authentication protocol based on the blockchain is proposed [24] | N/A | Sink nodes do not authenticate the SNs at the time of assigning sequence numbers | √ | × | √ |
Dynamic WSN has more uncertainty and a large coverage area, which causes trust issues | Registration of nodes, cluster formation and node logout [25] | Forward and backward security, resistance to impersonation, storage overhead, energy consumption | Complexity increases in key management. Communication overhead between BS and high storage space sensors | √ | × | √ |
Lack of traceability of each node in the IoT network | IoT framework is proposed where tractability of each node requires nodes’ registration into the blockchain [26] | Probability of attack success, authentication accuracy | Requires extra maintenance cost and storage capacity. Data tampering in local database | × | √ | √ |
Secure socket layer does not ensure user anonymity | The proposed system ensures data authenticity using blockchain to store data [27] | Power consumption, temperature, humidity measurement | N/A | √ | × | × |
Network latency and data delivery issues occur due to mobile sensors | An intrusion prevention framework is proposed for mobile IoT devices to provide reliable data routing [28] | Network lifetime, Packet Delivery Ratio (PDR), energy consumption, delay and routing overheads | In XOR hashing function, if an attacker knows one of the plain texts, then get another through them | × | √ | √ |
Increase network overhead | Trust aware localized routing discovers multiple routes but selects one route with trusted SNs [29] | Security and throughput, encryption and decryption performance, time complexity | No authentication mechanism. Malicious nodes cause low packet delivery and high packet delay | √ | √ | × |
Trust issues and single point of failure due to the central authority | BCR protocol is introduced that enables trust relationship between IoT vendors and cooperators [30] | Throughput, PDR, route acquisition latency, routing overhead | Low PDR | × | √ | × |
Malicious nodes cause gray and black hole attacks | A routing scheme through blockchain and reinforcement learning is used [31] | Enhance the routing efficiency and security of WSNs | Expense and burden increased on the server side due to the operational complexity | √ | × | × |
Storage and bandwidth issues | A light chain system for resource constrained devices is proposed [32] | Hash operations, hash quality, throughput, storage cost | N/A | × | × | √ |
Distributed nature requires high storage and faster transaction | Multi-level architecture for handling the IoUT data is proposed [33] | Reliability, accuracy, total remaining energy, energy consumption | N/A | √ | × | √ |
Local copy of the blockchain records is not feasible | Aggregated information is used to reduce the communication cost [34] | Relative frequency, communication cost | N/A | × | × | √ |
Blockchain has a slow update rate, while, in Tangle, miners validate its two previous transactions before joining network | The authors presented an optimized policy by using Tangle and blockchain technologies for sampling rate [35] | Age of information and sampling interval | N/A | × | × | √ |
PoW requires high processing ability and data storage availability | Mobile edge computing framework is proposed to utilize the blockchain [37] | Total net revenue | N/A | √ | × | √ |
Nodes may behave selfishly, they do not forward the packet | An incentive mechanism encourages the nodes to store the data [38] | The proposed system reduced the computing power as compared to the PoW | No authentication mechanism, expensive data storage | √ | × | √ |
Blockchain requires high resources to perform PoW on mobile devices | Rolling blockchain is proposed where smart cars are used as the nodes of the WSN. The whole database is stored on the server [39] | Probability of finding the connected paths | Merkle tree is not utilized for this network | √ | × | √ |
High latency, scalability issues and single point of failure | Blockchain and SDN based hybrid architecture are used [40] | Hash rate, transactions per second, average time per block and latency | Credential information stored on SDN can be leaked | × | × | √ |
High computational cost and storage constraint due to a large number of IoT devices | SDN, edge, fog and blockchain are used to develop a secure attack detection system [41] | F1-score, detection time, detection rate, accuracy, bandwidth Matthews correlation coefficient | System complexity increased, requires high computational power, cloud causes high latency | × | × | √ |
The service provider offers malicious services to the client | A blockchain based fair nonrepudiation service provisioning mechanism is proposed [42] | Average gas consumption, average transaction latency, average throughput | No off-chain mechanism is mentioned to deliver the major service part | × | √ | √ |
No authentication, presence of malicious nodes, low PDR, high delay, usage of symmetric keys | A blockchain based authentication and trust evaluation mechanism is proposed for secure routing. RSA encryption scheme is used [Proposed Model] | Network lifetime, energy consumption, throughput, gas consumption, transaction latency, processing time of RSA encryption and processing time of trust evaluation | High time consumption in generating the RSA keys | √ | √ | √ |
2.6. Data Security and Privacy
2.7. Nonrepudiation Mechanism
3. Problem Statement
4. System Model
- All the ANs, SNs and BSs have a particular Ethereum address.
- All the BSs and ANs are legitimate.
- There are no external factors and harsh network conditions that can affect the objective parameters: DT, FR and RT.
- PoA consensus algorithm is used in the private blockchain for validation of transactions and adding the blocks into the blockchain.
- PoW consensus algorithm is used in the public blockchain to validate the transactions and add the blocks into the blockchain.
- Mutual authentication: When two nodes want to communicate with each other, they first need to be recognized before the interaction. The identity of all nodes is stored on the BSs that authenticate the ANs.
- Nonrepudiation: The nodes that take part in the communication cannot deny sending the packets. The nonrepudiation scheme is performed on the blockchain. All operations are stored on it, therefore, data tampering cannot be performed.
- Integrity: This includes the data packets’ integrity, where unauthorized nodes cannot access and illegally tamper with the data packets in the interaction process. The integrity of the data packets is ensured by the authentication process, which is carried out by the public and private blockchains.
- Transparency and traceability: The whole process is traceable and transparent because the information of SNs is bound to each data record. Whenever any malicious node exists in the WSN, it can be identified by the traceability feature of the proposed model.
4.1. Initialization
4.2. Registration
4.3. Authentication
Algorithm 1: Nodes’ registration |
4.4. Trust Evaluation Mechanism
Algorithm 2: Mutual authentication |
4.4.1. Delayed Transmission
Algorithm 3: Trust value evaluation of sensor nodes |
4.4.2. Forwarding Rate
4.4.3. Response Time
4.4.4. Node Communication Quality
5. Simulation Results
5.1. Simulation Setup
5.2. Performance Metrics
5.2.1. Packet Delivery Ratio
5.2.2. Network Lifetime
5.2.3. Residual Energy
5.2.4. False Positive Rate
5.2.5. False Negative Rate
5.2.6. Detection Accuracy
6. Formal Security Analysis
6.1. Integer Underflow and Overflow
6.2. Parity Multisig Bug 2
6.3. Callstack Depth Attack Vulnerability
6.4. Transaction Ordering Dependence
6.5. Re-Entrancy Vulnerability
6.6. Timestamp Dependency
7. Attacker Model
8. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
Abbreviations
ANs | Aggregator Nodes |
API | Application Programming Interface |
BSs | Base Stations |
DA | Detection Accuracy |
DT | Delayed Transmission |
FR | Forwarding Rate |
FNR | False Negative Rate |
FPR | False Positive Rate |
IoT | Internet of Things |
MAC | Media Access Control |
NCQ | Node Communication Quality |
PDR | Packet Delivery Ratio |
PoA | Proof of Authority |
PoS | Proof of Stake |
PoW | Proof of Work |
RT | Response Time |
RSA | Rivest–Shamir–Adleman |
SNs | Sensor Nodes |
SDN | Software Defined Network |
WSNs | Wireless Sensor Networks |
Identity of an AN | |
Identity of a BS | |
Identity of an SN | |
Private Blockchain | |
Public Blockchain | |
Threshold to check the NCQ | |
Trust value of SNs | |
Weight of DT | |
Weight of FR | |
Weight of RT |
References
- Kandris, D.; Nakas, C.; Vomvas, D.; Koulouras, G. Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov. 2020, 3, 14. [Google Scholar] [CrossRef] [Green Version]
- Yetgin, H.; Cheung, K.T.; El-Hajjar, M.; Hanzo, L.H. A survey of network lifetime maximization techniques in wireless sensor networks. IEEE Commun. Surv. Tutor. 2017, 19, 828–854. [Google Scholar] [CrossRef] [Green Version]
- Noel, A.B.; Abdaoui, A.; Elfouly, T.; Ahmed, M.H.; Badawy, A.; Shehata, M.S. Structural health monitoring using wireless sensor networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2017, 19, 1403–1423. [Google Scholar] [CrossRef]
- Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H.J. Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors 2019, 19, 1494. [Google Scholar] [CrossRef] [Green Version]
- Azarhava, H.; Niya, J.M. Energy efficient resource allocation in wireless energy harvesting sensor networks. IEEE Wirel. Commun. Lett. 2020, 9, 1000–1003. [Google Scholar] [CrossRef]
- Khan, Z.A.; Latif, G.; Sher, A.; Usman, I.; Ashraf, M.; Ilahi, M.; Javaid, N. Efficient routing for corona based underwater wireless sensor networks. Computing 2019, 101, 831–856. [Google Scholar] [CrossRef]
- Lee, H.C.; Ke, K.H. Monitoring of large-area IoT sensors using a LoRa wireless mesh network system: Design and evaluation. IEEE Trans. Instrum. Meas. 2018, 67, 2177–2187. [Google Scholar] [CrossRef]
- Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
- Shin, S.; Kwon, T. A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes. Sensors 2019, 19, 2012. [Google Scholar] [CrossRef] [Green Version]
- Kim, T.H.; Goyat, R.; Rai, M.K.; Kumar, G.; Buchanan, W.J.; Saha, R.; Thomas, R. A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access 2019, 7, 184133–184144. [Google Scholar] [CrossRef]
- Guerrero-Sanchez, A.E.; Rivas-Araiza, E.A.; Gonzalez-Cordoba, J.L.; Toledano-Ayala, M.; Takacs, A. Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors 2020, 20, 2798. [Google Scholar] [CrossRef]
- Khalid, R.; Malik, M.W.; Alghamdi, T.A.; Javaid, N. A consortium blockchain based energy trading scheme for Electric Vehicles in smart cities. J. Inf. Secur. Appl. 2021, 63, 102998. [Google Scholar] [CrossRef]
- Gourisetti, S.N.; Mylrea, M.; Patangia, H. Evaluation and demonstration of blockchain applicability framework. IEEE Trans. Eng. Manag. 2019, 67, 1142–1156. [Google Scholar] [CrossRef]
- Samuel, O.; Javaid, N. GarliChain: A privacy preserving system for smart grid consumers using blockchain. Int. J. Energy Res. 2021, 1–17. [Google Scholar] [CrossRef]
- Bao, Z.; Wang, Q.; Shi, W.; Wang, L.; Lei, H.; Chen, B. When blockchain meets sgx: An overview, challenges, and open issues. IEEE Access 2020, 8, 170404–170420. [Google Scholar] [CrossRef]
- Abbas, S.; Javaid, N.; Almogren, A.; Gulfam, S.M.; Ahmed, A.; Radwan, A. Securing Genetic Algorithm Enabled SDN Routing for Blockchain Based Internet of Things. IEEE Access 2021, 9, 139739–139754. [Google Scholar] [CrossRef]
- Xu, Y.; Huang, Y. Segment blockchain: A size reduced storage mechanism for blockchain. IEEE Access 2020, 8, 17434–17441. [Google Scholar] [CrossRef]
- Moinet, A.; Darties, B.; Baril, J.L. Blockchain based trust and authentication for decentralized sensor networks. arXiv 2017, arXiv:1706.01730. [Google Scholar]
- She, W.; Liu, Q.; Tian, Z.; Chen, J.S.; Wang, B.; Liu, W. Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 2019, 7, 38947–38956. [Google Scholar] [CrossRef]
- Goyat, R.; Kumar, G.; Rai, M.K.; Saha, R.; Thomas, R.; Kim, T.H. Blockchain powered secure range-free localization in wireless sensor networks. Arab. J. Sci. Eng. 2020, 45, 6139–6155. [Google Scholar] [CrossRef]
- Alghamdi, W.; Rezvani, M.; Wu, H.; Kanhere, S.S. Routing-aware and malicious node detection in a concealed data aggregation for WSNs. ACM Trans. Sens. Netw. 2019, 15, 1–20. [Google Scholar] [CrossRef]
- Yadav, M.; Fathi, B.; Sheta, A. Selection of WSNs inter-cluster boundary nodes using PSO algorithm. J. Comput. Sci. Coll. 2019, 34, 47–53. [Google Scholar]
- Noshad, Z.; Khan, A.U.; Abbas, S.; Abubaker, Z.; Javaid, N.; Shafiq, M.; Choi, J.G. An Incentive and Reputation Mechanism Based on Blockchain for Crowd Sensing Network. J. Sens. 2021, 2021, 1798256. [Google Scholar] [CrossRef]
- Hong, S. P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw. Appl. 2020, 13, 579–589. [Google Scholar] [CrossRef]
- Tian, Y.; Wang, Z.; Xiong, J.; Ma, J. A blockchain-based secure key management scheme with trustworthiness in DWSNs. IEEE Trans. Ind. Inform. 2020, 16, 6193–6202. [Google Scholar] [CrossRef]
- Rathee, G.; Balasaraswathi, M.; Chandran, K.P.; Gupta, S.D.; Boopathi, C.S. A secure IoT sensors communication in industry 4.0 using blockchain technology. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 533–545. [Google Scholar] [CrossRef]
- Kolumban-Antal, G.; Lasak, V.; Bogdan, R.; Groza, B. A secure and portable multi-sensor module for distributed air pollution monitoring. Sensors 2020, 20, 403. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Haseeb, K.; Islam, N.; Almogren, A.; Din, I.U. Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. IEEE Access 2019, 7, 185496–185505. [Google Scholar] [CrossRef]
- Kumar, M.H.; Mohanraj, V.; Suresh, Y.; Senthilkumar, J.; Nagalalli, G. Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 5287–5295. [Google Scholar] [CrossRef]
- Ramezan, G.; Leung, C. A blockchain-based contractual routing protocol for the internet of things using smart contracts. Wirel. Commun. Mob. Comput. 2018, 2018, 4029591. [Google Scholar] [CrossRef]
- Yang, J.; He, S.; Xu, Y.; Chen, L.; Ren, J. A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks. Sensors 2019, 19, 970. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.; Wang, K.; Lin, Y.; Xu, W. LightChain: A lightweight blockchain system for industrial internet of things. IEEE Trans. Ind. Inform. 2019, 15, 3571–3581. [Google Scholar] [CrossRef]
- Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasurbramanian, V. A lightweight blockchain based framework for underwater iot. Electronics 2019, 8, 1552. [Google Scholar] [CrossRef] [Green Version]
- Danzi, P.; Kalør, A.E.; Stefanović, Č.; Popovski, P. Delay and communication tradeoffs for blockchain systems with lightweight IoT clients. IEEE Internet Things J. 2019, 6, 2354–2365. [Google Scholar] [CrossRef] [Green Version]
- Rovira-Sugranes, A.; Razi, A. Optimizing the age of information for blockchain technology with applications to IoT sensors. IEEE Commun. Lett. 2019, 24, 183–187. [Google Scholar] [CrossRef]
- Halgamuge, M.N. Optimization framework for best approver selection method (BASM) and best tip selection method (BTSM) for IOTA tangle network: Blockchain-enabled next generation industrial IoT. Comput. Netw. 2021, 199, 108418. [Google Scholar] [CrossRef]
- Liu, M.; Yu, F.R.; Teng, Y.; Leung, V.C.; Song, M. Computation offloading and content caching in wireless blockchain networks with mobile edge computing. IEEE Trans. Veh. Technol. 2018, 67, 11008–11021. [Google Scholar] [CrossRef]
- Ren, Y.; Liu, Y.; Ji, S.; Sangaiah, A.K.; Wang, J. Incentive mechanism of data storage based on blockchain for wireless sensor networks. Mob. Inf. Syst. 2018, 2018, 6874158. [Google Scholar] [CrossRef] [Green Version]
- Kushch, S.; Prieto-Castrillo, F. Blockchain for dynamic nodes in a smart city. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 29–34. [Google Scholar]
- Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [Google Scholar] [CrossRef]
- Rathore, S.; Kwon, B.W.; Park, J.H. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl. 2019, 143, 167–177. [Google Scholar] [CrossRef]
- Xu, Y.; Ren, J.; Wang, G.; Zhang, C.; Yang, J.; Zhang, Y. A blockchain-based nonrepudiation network computing service scheme for industrial IoT. IEEE Trans. Ind. Inform. 2019, 15, 3632–3641. [Google Scholar] [CrossRef]
- Cinque, M.; Cotroneo, D.; Di Martino, C.; Russo, S.; Testa, A. Avr-inject: A tool for injecting faults in wireless sensor nodes. In Proceedings of the 2009 IEEE International Symposium on Parallel and Distributed Processing, Rome, Italy, 23–29 May 2009; pp. 1–8. [Google Scholar]
- Cui, Z.; Fei, X.U.; Zhang, S.; Cai, X.; Cao, Y.; Zhang, W.; Chen, J. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans. Serv. Comput. 2020, 13, 241–251. [Google Scholar] [CrossRef]
- Awan, S.; Sajid, M.B.; Amjad, S.; Aziz, U.; Gurmani, M.U.; Javaid, N. Blockchain based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks. In Proceedings of the 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Asan, Korea, 1–3 July 2021. [Google Scholar]
- Rathee, M.; Kumar, S.; Gandomi, A.H.; Dilip, K.; Balusamy, B.; Patan, R. Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Trans. Eng. Manag. 2019, 68, 170–182. [Google Scholar] [CrossRef]
- Kalidoss, T.; Rajasekaran, L.; Kanagasabai, K.; Sannasi, G.; Kannan, A. QoS aware trust based routing algorithm for wireless sensor networks. Wirel. Pers. Commun. 2020, 110, 1637–1658. [Google Scholar] [CrossRef]
- Khalid, N.A.; Bai, Q.; Al-Anbuky, A. Adaptive trust-based routing protocol for large scale WSNs. IEEE Access 2019, 7, 143539–143549. [Google Scholar] [CrossRef]
- Praitheeshan, P.; Pan, L.; Yu, J.; Liu, J.; Doss, R. Security analysis methods on ethereum smart contract vulnerabilities: A survey. arXiv 2019, arXiv:1908.08605. [Google Scholar]
- Sadiq, A.; Javed, M.U.; Khalid, R.; Almogren, A.; Shafiq, M.; Javaid, N. Blockchain Based Data and Energy Trading in Internet of Electric Vehicles. IEEE Access 2020, 9, 7000–7020. [Google Scholar] [CrossRef]
Identified Limitations | Proposed Solutions | Validation Done |
---|---|---|
L1: Presence of malicious nodes | S1: Trust evaluation considering NCQ value to remove malicious nodes from the network | V1: Trust values of the SNs, FNR, FPR and DA. The results are depicted in Figure 2b and Figure 3a,b |
L2: Low PDR due to the involvement of malicious nodes L.3: High energy consumption of the SNs | S2, S3: The trusted SNs perform routing. SNs send their packets to the ANs, who forward the packets to BSs. Through this process, little energy is consumed by the SNs | V2, V3: PDR, network lifetime and residual energy. The results are depicted in Figure 2a and Figure 4a,b |
L4: Key exchange problem | S4: RSA is used for the secure transmission of data considering key generation, encryption and decryption | V4: Direct validation is not shown explicitly |
Parameters | Values |
---|---|
Sensing area | 100 × 100 m |
SNs | 100 |
ANs | 4 |
BSs | 2 |
Deployment | Random |
Initial energy of SNs | 0.05 J |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Awan, S.; Javaid, N.; Ullah, S.; Khan, A.U.; Qamar, A.M.; Choi, J.-G. Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks. Sensors 2022, 22, 411. https://doi.org/10.3390/s22020411
Awan S, Javaid N, Ullah S, Khan AU, Qamar AM, Choi J-G. Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks. Sensors. 2022; 22(2):411. https://doi.org/10.3390/s22020411
Chicago/Turabian StyleAwan, Saba, Nadeem Javaid, Sameeh Ullah, Asad Ullah Khan, Ali Mustafa Qamar, and Jin-Ghoo Choi. 2022. "Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks" Sensors 22, no. 2: 411. https://doi.org/10.3390/s22020411
APA StyleAwan, S., Javaid, N., Ullah, S., Khan, A. U., Qamar, A. M., & Choi, J. -G. (2022). Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks. Sensors, 22(2), 411. https://doi.org/10.3390/s22020411