Prevention of Sybil Attack on Block Chain to Ensure Security of Wireless Sensor Network

Authors

  • Satpal Singh Research Scholar,Departmentof ComputerScience, Punjabi University Patiala
  • Subhash Chander Assistant Professor in Computer Science University College Jaitu

Keywords:

Wireless Sensor Network, Block chain, Proof of Work, Proof of Authority

Abstract

This study explores the enhancement of security and reliability in a Wireless Sensor Network (WSN) using blockchain technology. We focus on the integration of blockchain within WSN to provide robust authentication without the involvement of a third party. The methodology begins with the collection of routing data using Q-tables in MATLAB, followed by uploading this data to the blockchain, ensuring the data's security with SHA256 cryptography encryption. The blockchain network's resilience is assessed against a Sybil attack by employing two consensus algorithms, Proof of Work (PoW) and Proof of Authority (PoA). We execute a Sybil attack on the blockchain network, aiming to investigate the efficiency of PoW and PoA in detecting and preventing the attack. The assessment reveals that PoW provides superior security guarantees, maintaining the blockchain's integrity, validity, and resilience against the attack, albeit with higher computational efforts. In contrast, PoA demonstrates faster operations but fails to ensure the network's integrity post-attack, proving to be less reliable in a hostile environment. This comprehensive examination offers valuable insights into the security dynamics of a blockchain-integrated WSN, contributing substantially to the field by outlining the strengths and weaknesses of employing different consensus algorithms in thwarting potential attacks on the network.

Downloads

Download data is not yet available.

References

Mandala Mounicaetal (2021).Detecting Sybi lAttack In Wireless Sensor Networks Using Machine Learning Algorithms IOP Conf. Ser.: Mater. Sci.Eng.1042012029DOI10.1088/1757-899X/1042/1/012029

Dhamodharan, U. S. R. K., & Vayanaperumal, R. (2015). Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method. The Scientific World Journal,2015,841267.doi:10.1155/2015/841267

Arshad, A., Mohd Hanapi, Z. ,Subramaniam,S.,&Latip,R.(2021).A survey of Sybil attack counter measures in IoT-based wire less sensor networks. PeerJ.Computer science,7,e673.https://doi.org/10.7717/peerj-cs.673

Zhukabayeva T. K; Mardenov E. M; Abdildaeva A.A (2020). Sybil Attack DetectioninWirelessSensorNetworks.doi:10.1109/AICT50176.2020.9368790.

Sung-JungHsiao,W.-T.S.(2021). Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission. Computers, Materials& Continua, 68(2),1899–1918.doi:10.32604/cmc.2021.015762.

Nguyen, Van-Cuong & Nguyen, Minh & B, Trang & Tran, Thang & Duy, Nguyen. (2021).Blockchain Technology in Wireless Sensor Network: Benefits and Challenges.1-5.

Mubarakali, A. (2022).An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks. Wireless Pers Commun -w.

Elangovan, D., Long, C. S. ,Bakrin, F. S., Tan, C.S., Goh, K.W., Yeoh,S.F.,Loy, M. J., Hussain, Z., Lee, K. S., Idris, A. C., & Ming, L. C. (2022). The Use of Blockchain Technology in the Health Care Sector: Systematic Review. JMIR medicalinformatics,10(1),e17278..

Godawatte, K., Branch, P., & But, J. (2022). Use of blockchain in health sensor networks to secure information integrity and accountability. ProcediaComputerScience,210,124–132.doi:10.1016/j.procs.2022.10.128.

Ramasamy, L. K., Khan K. P., F., Imoize, A. L., Ogbebor, J. O., Kadry, S., & Rho, S.(2021). Blockchain-Based Wireless Sensor Networks for Malicious Node Detection:ASurvey.IEEEAccess,9,128765–128785.doi:10.1109/ACCESS.2021.3111923.

Nguyen,M.,Nguyen,C.,&Tran,H.T.(2022).AFrameworkofDeployingBlockchain in Wireless Sensor Networks. EAI Endorsed Transactions on IndustrialNetworks And Intelligent Systems,9(32),

Paulraj D., Jayasudha, L. R, T., Ishwarya M, N., Daniya T. and Daniel S, F. (2023)."Blockchain-based Wireless Sensor Network Security Through Authentication andCluster Head Selection," 2023 IEEE International Conference on Integrated CircuitsandCommunicationSystems(ICICACS),Raichur,India,pp.1-5,doi:10.1109/ICICACS57338.2023.10099593.

Awan, S., Javaid, N., Ullah, S., Khan, A. U., Qamar, A. M., & Choi, J. G. (2022).BlockchainBasedSecureRoutingandTrustManagementinWirelessSensorNetworks.Sensors (Basel, Switzerland),22(2), 411.

Shahbazi,Z.,& Byun,Y.C. (2020). Towards a Secure Thermal-Energy AwareRoutingProtocolinWirelessBodyAreaNetworkBasedonBlockchainTechnology. Sensors (Basel, Switzerland),20(12), 3604.

Qu, Y., Zheng, G., Wu, H., Ji, B., & Ma, H. (2019). An Energy-Efficient RoutingProtocol for Reliable Data Transmission in Wireless Body Area Networks. Sensors(Basel,Switzerland),19(19),4238.https://doi.org/10.3390/s19194238.

Zhang,G.,Zhang,Y.,&Chen,Z.(2013).Usingtrusttosecuregeographicandenergyawareroutingagainstmultipleattacks. PloSone, 8(10),e77488.

Bangotra, D. K., Singh, Y., Kumar, N., Kumar Singh, P., & Ojeniyi, A. (2022).Energy-Efficient and Secure Opportunistic Routing Protocol for WSN: Performance Analysis with Nature-Inspired Algorithms and Its Application in Biomedical Applications. BioMed research international,2022, 1976694.

Kumar, M., Mukherjee, P., Verma, S., Kavita, Kaur, M., Singh, S., Kobielnik, M.,Woźniak,M.,Shafi,J.,&Ijaz,M.F.(2022).BBNSF:Blockchain-BasedNovelSecureFramework Using RP2-RSA and ASR-ANN Technique for IoT Enabled Health care Systems. Sensors (Basel, Switzerland),22(23),9448.

Feng,R.,Xu,X.,Zhou,X.,&Wan,J.(2011). A trust evaluation algorithm for wireless ssensor networks based on node behaviors and D-S evidence theory. Sensors (Basel,Switzerland),11(2),1345–1360.

Khan, A. S., Balan, K., Javed, Y., Tarmizi, S., & Abdullah, J. (2019). Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET. Sensors (Basel,Switzer land),19(22),4954

Downloads

Published

13.12.2023

How to Cite

Singh, S. ., & Chander, S. . (2023). Prevention of Sybil Attack on Block Chain to Ensure Security of Wireless Sensor Network. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 14–24. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4083

Issue

Section

Research Article