Prevention of Sybil Attack on Block Chain to Ensure Security of Wireless Sensor Network
Keywords:
Wireless Sensor Network, Block chain, Proof of Work, Proof of AuthorityAbstract
This study explores the enhancement of security and reliability in a Wireless Sensor Network (WSN) using blockchain technology. We focus on the integration of blockchain within WSN to provide robust authentication without the involvement of a third party. The methodology begins with the collection of routing data using Q-tables in MATLAB, followed by uploading this data to the blockchain, ensuring the data's security with SHA256 cryptography encryption. The blockchain network's resilience is assessed against a Sybil attack by employing two consensus algorithms, Proof of Work (PoW) and Proof of Authority (PoA). We execute a Sybil attack on the blockchain network, aiming to investigate the efficiency of PoW and PoA in detecting and preventing the attack. The assessment reveals that PoW provides superior security guarantees, maintaining the blockchain's integrity, validity, and resilience against the attack, albeit with higher computational efforts. In contrast, PoA demonstrates faster operations but fails to ensure the network's integrity post-attack, proving to be less reliable in a hostile environment. This comprehensive examination offers valuable insights into the security dynamics of a blockchain-integrated WSN, contributing substantially to the field by outlining the strengths and weaknesses of employing different consensus algorithms in thwarting potential attacks on the network.
Downloads
References
Mandala Mounicaetal (2021).Detecting Sybi lAttack In Wireless Sensor Networks Using Machine Learning Algorithms IOP Conf. Ser.: Mater. Sci.Eng.1042012029DOI10.1088/1757-899X/1042/1/012029
Dhamodharan, U. S. R. K., & Vayanaperumal, R. (2015). Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method. The Scientific World Journal,2015,841267.doi:10.1155/2015/841267
Arshad, A., Mohd Hanapi, Z. ,Subramaniam,S.,&Latip,R.(2021).A survey of Sybil attack counter measures in IoT-based wire less sensor networks. PeerJ.Computer science,7,e673.https://doi.org/10.7717/peerj-cs.673
Zhukabayeva T. K; Mardenov E. M; Abdildaeva A.A (2020). Sybil Attack DetectioninWirelessSensorNetworks.doi:10.1109/AICT50176.2020.9368790.
Sung-JungHsiao,W.-T.S.(2021). Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission. Computers, Materials& Continua, 68(2),1899–1918.doi:10.32604/cmc.2021.015762.
Nguyen, Van-Cuong & Nguyen, Minh & B, Trang & Tran, Thang & Duy, Nguyen. (2021).Blockchain Technology in Wireless Sensor Network: Benefits and Challenges.1-5.
Mubarakali, A. (2022).An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks. Wireless Pers Commun -w.
Elangovan, D., Long, C. S. ,Bakrin, F. S., Tan, C.S., Goh, K.W., Yeoh,S.F.,Loy, M. J., Hussain, Z., Lee, K. S., Idris, A. C., & Ming, L. C. (2022). The Use of Blockchain Technology in the Health Care Sector: Systematic Review. JMIR medicalinformatics,10(1),e17278..
Godawatte, K., Branch, P., & But, J. (2022). Use of blockchain in health sensor networks to secure information integrity and accountability. ProcediaComputerScience,210,124–132.doi:10.1016/j.procs.2022.10.128.
Ramasamy, L. K., Khan K. P., F., Imoize, A. L., Ogbebor, J. O., Kadry, S., & Rho, S.(2021). Blockchain-Based Wireless Sensor Networks for Malicious Node Detection:ASurvey.IEEEAccess,9,128765–128785.doi:10.1109/ACCESS.2021.3111923.
Nguyen,M.,Nguyen,C.,&Tran,H.T.(2022).AFrameworkofDeployingBlockchain in Wireless Sensor Networks. EAI Endorsed Transactions on IndustrialNetworks And Intelligent Systems,9(32),
Paulraj D., Jayasudha, L. R, T., Ishwarya M, N., Daniya T. and Daniel S, F. (2023)."Blockchain-based Wireless Sensor Network Security Through Authentication andCluster Head Selection," 2023 IEEE International Conference on Integrated CircuitsandCommunicationSystems(ICICACS),Raichur,India,pp.1-5,doi:10.1109/ICICACS57338.2023.10099593.
Awan, S., Javaid, N., Ullah, S., Khan, A. U., Qamar, A. M., & Choi, J. G. (2022).BlockchainBasedSecureRoutingandTrustManagementinWirelessSensorNetworks.Sensors (Basel, Switzerland),22(2), 411.
Shahbazi,Z.,& Byun,Y.C. (2020). Towards a Secure Thermal-Energy AwareRoutingProtocolinWirelessBodyAreaNetworkBasedonBlockchainTechnology. Sensors (Basel, Switzerland),20(12), 3604.
Qu, Y., Zheng, G., Wu, H., Ji, B., & Ma, H. (2019). An Energy-Efficient RoutingProtocol for Reliable Data Transmission in Wireless Body Area Networks. Sensors(Basel,Switzerland),19(19),4238.https://doi.org/10.3390/s19194238.
Zhang,G.,Zhang,Y.,&Chen,Z.(2013).Usingtrusttosecuregeographicandenergyawareroutingagainstmultipleattacks. PloSone, 8(10),e77488.
Bangotra, D. K., Singh, Y., Kumar, N., Kumar Singh, P., & Ojeniyi, A. (2022).Energy-Efficient and Secure Opportunistic Routing Protocol for WSN: Performance Analysis with Nature-Inspired Algorithms and Its Application in Biomedical Applications. BioMed research international,2022, 1976694.
Kumar, M., Mukherjee, P., Verma, S., Kavita, Kaur, M., Singh, S., Kobielnik, M.,Woźniak,M.,Shafi,J.,&Ijaz,M.F.(2022).BBNSF:Blockchain-BasedNovelSecureFramework Using RP2-RSA and ASR-ANN Technique for IoT Enabled Health care Systems. Sensors (Basel, Switzerland),22(23),9448.
Feng,R.,Xu,X.,Zhou,X.,&Wan,J.(2011). A trust evaluation algorithm for wireless ssensor networks based on node behaviors and D-S evidence theory. Sensors (Basel,Switzerland),11(2),1345–1360.
Khan, A. S., Balan, K., Javed, Y., Tarmizi, S., & Abdullah, J. (2019). Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET. Sensors (Basel,Switzer land),19(22),4954
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.