111
Views
1
CrossRef citations to date
0
Altmetric
Computers and Computing

Blockchain-based Light-weight Authentication Approach for a Multiple Wireless Sensor Network

& ORCID Icon

References

  • M. Younis, et al., “Topology management techniques for tolerating node failures in wireless sensor networks: A survey,” Comput. Netw., Vol. 58, pp. 254–83, Jan. 2014. DOI:10.1016/j.comnet.2013.08.021.
  • Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Commun. Surv. Amp, Vol. 8, no. 2, pp. 2-23, 2006. DOI:10.1109/COMST.2006.315852.
  • M. N. Aman, K. C. Chua, and B. Sikdar, “Mutual authentication in IoT systems using physical unclonable functions,” IEEE Internet of Things J., Vol. 4, no. 5, pp. 1327–40, 2017. DOI:10.1109/JIOT.2017.2703088.
  • B. Chatterjee, D. Das, and S. Sen. “RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning.” 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, pp. 205–208, 2018, DOI:10.1109/HST.2018.8383916.
  • J. Li, L. Tan, and D. Long. “A new key management and authentication method for WSN based on CPK.” 2008 ISECS International Colloquium on Computing, Communication, Control, and Management. Vol. 2. IEEE, pp. 486–490, 2008, DOI:10.1109/CCCM.2008.143.
  • S. Kumar, and R. K. Singh, “Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN,” Int. J. Commun. Networks Distrib. Sys, Vol. 17, no. 2, pp. 189–201, 2016. DOI:10.1504/IJCNDS.2016.079102
  • A. Mateen, and J. Tanveer. “One step forward: towards a blockchain based trust model for WSNs.” International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Springer, Cham, Vol. 23, pp. 345–890, 2019.
  • L. Feng, H. Zhang, L. Lou, and Y. Chen. “A blockchain-based collocation storage architecture for data security process platform of WSN,” 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 75–80, 2018, DOI:10.1109/CSCWD.2018.8465319.
  • Y. Harbi, and Z. Aliouat, “Enhanced authentication and key management scheme for securing data transmission in the internet of things,” Ad. Hoc. Netw., Vol. 94, pages:101948, 2019. DOI:10.1016/j.adhoc.2019.101948.
  • N. A. M. Alduais, J. Abdullah, A. Jamil, and L. Audah. “An efficient data collection and dissemination for IOT based WSN,” 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vol. 112, pp. 1–6, 2016, DOI:10.1109/IEMCON.2016.7746084.
  • L. Feng-Yu, C. Guo-Hua, and L. Xiao-Ding. “Ad hoc Networks security mechanism based on CPK.” 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007). IEEE, Vol. 678, pp. 522–525, 2007, DOI:10.1109/CISW.2007.4425548.
  • K.-A. Shim, Y.-R. Lee, and C.-M. Park, “EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks,” Ad. Hoc. Netw., Vol. 11, no. 1, pp. 182–9, 2013. DOI:10.1016/j.adhoc.2012.04.015.
  • R. U. Anitha, and P. Kamalakkannan. “Enhanced cluster based routing protocol for mobile nodes in wireless sensor network.” 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering. IEEE, vol. 13, pp. 187–193, DOI:10.1109/ICPRIME.2013.6496470.
  • V. Saranya, S. Shankar, and G. R. Kanagachidambaresan, “Energy efficient clustering scheme (EECS) for wireless sensor network with mobile sink,” Wirel. Pers. Commun., Vol. 100, no. 4, pp. 1553–67, 2018. DOI:10.1007/s11277-018-5653-1.
  • D. Liu, and P. Ning, “Multi-level µTESLA: A broadcast authentication system for distributed sensor networks,” http://discovery.csc.ncsu.edu/pubs. ML-microTESLA.pdf, Vol. 56, pp. 56–68, 2019.
  • M. El_Saadawy, and E. Shaaban. “Enhancing S-LEACH security for wireless sensor networks.” 2012 IEEE International Conference on Electro/Information Technology. IEEE, pp. 1–6, 2012, DOI:10.1109/EIT.2012.6220698.
  • M. Elshrkawey, S. M. Elsherif, and M. Elsayed Wahed, “An enhancement approach for reducing the energy consumption in wireless sensor networks,” J. King Saud Univ.-Comput. Inf. Sci, Vol. 30, no. 2, pp. 259–67, 2018. DOI:10.1016/j.jksuci.2017.04.002
  • M. Panda. “Data security in wireless sensor networks via AES algorithm.” 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO). IEEE, pp. 1–5, 2015, DOI:10.1109/ISCO.2015.7282377.
  • P. Joshi, M. Verma, and P. R. Verma. “Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN.” 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, Vol. 67, pp. 527–532, 2015, DOI:10.1109/ICCICCT.2015.7475336.
  • A. Ashtari, A. Shabani, and B. Alizadeh. “A new RF-PUF based authentication of internet of things using random forest classification.” 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, Vol. 6, pp. 21–26, 2019, DOI:10.1109/ISCISC48546.2019.8985161.
  • A. Gladston, A. P. Mohan, and M. Asfak, “Merkle tree and blockchain based cloud data auditing,” Int. J. Cloud Appl. Comput, Vol. 10, no. 3, pp. 54–66, July 2020. DOI:10.4018/IJCAC.2020070103.
  • O. Delgado-Mohatar, A. Fúster-Sabater, and J. M. Sierra, “A light-weight authentication scheme for wireless sensor networks,” Ad Hoc Networks, Vol. 9, no. 5, pp. 727–35, 2011. DOI:10.1016/j.adhoc.2010.08.020.
  • K. Singh. “WSN LEACH based protocols: A structural analysis,” 2015 International Conference and Workshop on Computing and Communication (IEMCON), pp. 1–7, 2015., DOI:10.1109/IEMCON.2015.7344478.
  • R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi, and K. Salah. “A user authentication scheme of IoT devices using blockchain-enabled fog nodes,” 2018 IEEE/ACS15th International Conference on Computer Systems and Applications (AICCSA), pp. 1–8, 2018, DOI:10.1109/AICCSA.2018.8612856.
  • M. A. Khan, and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Future Gener. Comput. Syst., Vol. 82, pp. 395–411, 2018. DOI:10.1016/j.future.2017.11.022
  • V. Gatate, and J. Agarkhed. “Spectrum aware cryptography (SAC) in wireless cognitive radio sensor networks for delay sensitive applications,” 2020 International Conference for Emerging Technology (INCET), Vol. 678, pp. 1–7, 2020, DOI:10.1109/INCET49848.2020.9154027.
  • M. Al-Zubaidie, Z. Zhang, and J. Zhang, “Efficient and secure ECDSA algorithm and its applications: a survey,” arXiv preprint arXiv: 1902.10313, 2019. DOI:10.48550/arXiv.1902.10313.
  • A. Roy, and S. Karforma, “A survey on digital signatures and its applications,” J. Comput. Inf. Technol, Vol. 3, no. 1, pp. 45–69, 2012.
  • A. H. Moon, U. Iqbal, and G. Mohiuddin Bhat, “Implementation of node authentication for WSN using hash chains,” Procedia. Comput. Sci., Vol. 89, pp. 90–98, 2016. DOI:10.1016/j.procs.2016.06.013.
  • H. Wang, and Q. Li. “Efficient implementation of public key cryptosystems on mote sensors (short paper).” International Conference on Information and Communications Security. Springer, Berlin, Heidelberg, pp. 27–5302006.
  • M. Fotouhi, M. Bayat, A. K. Das, H. A. Far, S. M. Pournaghi, and M. A. Doostari, “A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT,” Comput. Netw., Vol. 177, pp. 107333, 2020 Aug 4. DOI:10.1016/j.comnet.2020.107333.
  • H. M. Palombo. A Comparative Study of Formal Verification Techniques for Authentication Protocols. University of South Florida. Tampa, 2015.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.