Full text

Turn on search term navigation

Copyright © 2022 Asad Ullah Khan et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

In this paper, a routing protocol based on energy temperature degree-low energy-adaptive clustering hierarchy (ETD-LEACH) is proposed. In the protocol, nodes consume less energy when transmitting data, which improves the network lifetime. The proposed protocol selects the cluster heads (CHs) on the bases of degree, temperature, and energy to perform routing. Moreover, for solving the issue of a single point of failure, the blockchain is utilized. The data transactions are also housed in the blockchain, which is deployed on the CHs and BSs, as, in blockchain, multiple nodes take part. Therefore, to perform a consensus between them, a proof-of-authority (PoA) consensus mechanism is used in the underlying work. In the blockchain, the secure hashing algorithm-256 (SHA-256) is used for secure hashing of data transactions. Furthermore, malicious nodes are detected during the routing using the real-time message content validation (RMCV) scheme in the ETD-LEACH protocol. The proposed model is evaluated under the denial-of-service (DoS) attack, the man-in-the-middle (MITM) attack, and the smart contract analysis performed by the Oyente tool. The performance of the proposed model is evaluated through simulations. The ETD-LEACH and energy threshold-low energy-adaptive clustering hierarchy (ETH-LEACH) protocols are compared using different parameters like number of alive nodes, energy consumption, throughput, and delay. ETD-LEACH consumes less energy and has a better network lifetime as compared to ETH-LEACH. In addition, the RMCV-ETD-LEACH network performance is better than that of both DoS-ETD-LEACH and MITM-ETD-LEACH. Moreover, PoA transaction cost is less than that of proof of work. Also, the execution time of SHA-256 is less than the execution time of SHA-512. Moreover, the value of the packet delivery ratio (PDR) is found to be 89.9% and 99.9% with and without the malicious nodes, respectively.

Details

Title
Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks
Author
Khan, Asad Ullah 1 ; Maimoona Bint E Sajid 2 ; Rauf, Abdul 3 ; Malik, Najmus Saqib 4 ; Zaman, Fawad 5 ; Javaid, Nadeem 6   VIAFID ORCID Logo 

 Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan; Department of Computer Science, Federal Urdu University, Islamabad 44000, Pakistan 
 Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan 
 Hamdard University, Islamabad 44000, Pakistan 
 Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah 21959, Saudi Arabia 
 Department of Electrical and Computer Engineering, COMSATS University Islamabad, Islamabad 44000, Pakistan 
 Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan; School of Computer Science, University of Technology Sydney, Ultimo, NSW 2007, Australia 
Editor
AH Alamoodi
Publication year
2022
Publication date
2022
Publisher
John Wiley & Sons, Inc.
e-ISSN
15308677
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2701962859
Copyright
Copyright © 2022 Asad Ullah Khan et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.