IJWMT Vol. 14, No. 6, 8 Dec. 2024
Cover page and Table of Contents: PDF (size: 796KB)
PDF (796KB), PP.15-25
Views: 0 Downloads: 0
Blockchain, Wireless Sensor Networks, Cyber Attacks, Integrity Management, Decentralization
Wireless sensor networks (WSNs) are widely used across various fields, facilitating the gathering of critical data for monitoring physical and environmental conditions. However, traditional WSNs encounter cybersecurity challenges, including weak node authentication, limited fault tolerance, insufficient detection of malicious nodes, and insecure data integrity management. Given these vulnerabilities, it is essential to develop effective solutions to address WSN cybersecurity issues. A key concern that requires special focus is ensuring robust data integrity management to resolve trust-related problems in WSNs. Most current existing solutions rely on centralized systems, which are vulnerable to tampering and offer no proper data integrity management or traceability for the data gathered from sensors. In this paper, we present an architecture based on blockchain technology to ensure secure data transmission and effective data integrity management for data collected from WSN devices. By employing the decentralized and immutable nature of blockchain, the integration of WSN and blockchain technology provides a robust infrastructure that features tamper-resistant for better decision-making process. The results show that the proposed architecture offers secure data storage and provides strong performance, capable of scaling to accommodate large WSNs through the use of blockchain. This study also identifies the most common challenges in integrating blockchain with WSNs and provides appropriate solutions to fully harness the benefits of blockchain applications in these networks.
Yahye Adam Omar, "Blockchain-enabled Data Integrity in Wireless Sensor Networks", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.14, No.6, pp. 15-25, 2024. DOI:10.5815/ijwmt.2024.06.02
[1]J. M. Jornet, E. W. Knightly, and D. M. Mittleman, “Wireless communications sensing and security above 100 GHz,” Nature Communications 2023 14:1, vol. 14, no. 1, pp. 1–10, Feb. 2023, doi: 10.1038/s41467-023-36621-x.
[2]H. Kumar, “A Review of Wireless Sensor Network from Future Perspective,” Eduzone: International Peer Reviewed/Refereed Multidisciplinary Journal, vol. 12, no. 1, pp. 84–88, Feb. 2023, Accessed: Jul. 09, 2023. [Online]. Available: https://eduzonejournal.com/index.php/eiprmj/article/view/259
[3]M. Sirajuddin and B. Sateesh Kumar, “Collaborative Security Schemes for Wireless Sensor Networks,” Lecture Notes in Electrical Engineering, vol. 828, pp. 343–354, 2022, doi: 10.1007/978-981-16-7985-8_36/COVER.
[4]F. A. Sunny et al., “A Systematic Review of Blockchain Applications,” IEEE Access, vol. 10, pp. 59155–59177, 2022, doi: 10.1109/ACCESS.2022.3179690.
[5]N. Badri, L. Nasraoui, and L. A. Saidane, “Blockchain for WSN and IoT Applications,” 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications, SETIT 2022, pp. 543–548, 2022, doi: 10.1109/SETIT54465.2022.9875746.
[6]T. Yang et al., “Applying blockchain technology to decentralized operation in future energy internet,” ieeexplore.ieee.org, doi: 10.1109/EI2.2017.8244418.
[7]D. Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain Technology Overview,” Jun. 2019, doi: 10.6028/NIST.IR.8202.
[8]Rehman, A., Abdullah, S., Fatima, M., Iqbal, M. W., Almarhabi, K. A., Ashraf, M. U., & Ali, S. (2022). Ensuring Security and Energy Efficiency of Wireless Sensor Network by Using Blockchain. Applied Sciences, 12(21), 10794. https://doi.org/10.3390/app122110794.
[9]Haro-Olmo, F. J., Alvarez-Bermejo, J. A., Varela-Vaca, A. J., & López-Ramos, J. A. (2021b). Blockchain-based federation of wireless sensor nodes. The Journal of Supercomputing, 77(7), 7879–7891. https://doi.org/10.1007/s11227-020-03605-3.
[10]L. K. Ramasamy, F. Khan K. P., A. L. Imoize, J. O. Ogbebor, S. Kadry and S. Rho, "Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey," in IEEE Access, vol. 9, pp. 128765-128785, 2021, doi: 10.1109/ACCESS.2021.3111923.
[11]Nguyen, M. D., Nguyen, M. T., Vu, T. C., Ta, T. M., Tran, Q. A., & Nguyen, D. T. (2024). A Comprehensive Study on Applications of Blockchain in Wireless Sensor Networks for Security Purposes. Journal of Computing Theories and Applications ISSN, 3024, 9104.
[12]Hsiao, S. J., & Sung, W. T. (2021). Utilizing blockchain technology to improve WSN security for sensor data transmission. Comput. Mater. Contin, 68, 1899-1918.
[13]Almaiah, M. A. (2021). A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology. In Artificial intelligence and blockchain for future cybersecurity applications (pp. 217-234). Cham: Springer International Publishing.
[14]Singh, T., & Vaid, R. (2023). Blockchain Integrated Intelligent Monitoring System for Wireless Sensor Network. 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), 612-620.
[15]Nguyen, M., Nguyen, C., & Tran, H. T. (2022). A framework of deploying blockchain in wireless sensor networks. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 9(32).
[16]P. E. A. S. T. Ehizuenlen, “Design of a Smart Custom Sensor Node Architecture for Wireless Sensor Network (WSN),” Journal of Science and Technology Research, vol. 5, no. 2, pp. 2023–133, Jun. 2023, doi: 10.5281/ZENODO.8014261.
[17]D. Kandris, C. Nakas, D. Vomvas, and G. Koulouras, “Applications of Wireless Sensor Networks: An Up-to-Date Survey,” Applied System Innovation 2020, Vol. 3, Page 14, vol. 3, no. 1, p. 14, Feb. 2020, doi: 10.3390/ASI3010014.
[18]M. Majid et al., “Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review,” Sensors 2022, Vol. 22, Page 2087, vol. 22, no. 6, p. 2087, Mar. 2022, doi: 10.3390/S22062087.
[19]J. Grover and S. Sharma, “Security issues in Wireless Sensor Network-A review,” 2016 5th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2016: Trends and Future Directions, pp. 397–404, Dec. 2016, doi: 10.1109/ICRITO.2016.7784988.
[20]Z. Zhao, L. Du, F. Sun, Z. Fang, Z. Xu, and D. Chen, “A Review of Attacks and Security Protocols for Wireless Sensor Networks,” Article in Journal of Networks, 2014, doi: 10.4304/jnw.9.5.1103-1113.
[21]P. Bekal, P. Kumar, P. R. Mane, and G. Prabhu, “A comprehensive review of energy efficient routing protocols for query driven wireless sensor networks,” F1000Research 2023 12:644, vol. 12, p. 644, Jun. 2023, doi: 10.12688/f1000research.133874.1.
[22]S. Singh, R. Saurabh, T. Maitra, and D. Giri, “Security in Communication for Intelligent Wireless Sensor Networks : Issues and Challenges,” Computational Intelligence for Wireless Sensor Networks, pp. 175–192, Jul. 2022, doi: 10.1201/9781003102397-10.
[23]“Recent Trends for Security Applications in Wireless Sensor Networks – A Technical Review | IEEE Conference Publication | IEEE Xplore.” https://ieeexplore.ieee.org/abstract/document/8991249 (accessed Jul. 10, 2023).
[24]M. Abujubbeh, F. Al-Turjman, and M. Fahrioglu, “Software-defined wireless sensor networks in smart grids: An overview,” Sustain Cities Soc, vol. 51, p. 101754, Nov. 2019, doi: 10.1016/J.SCS.2019.101754.
[25]J. M. Parenreng, A. Kitagawa, and D. D. Andayani, “A Study of Limited Resources and Security Adaptation for Extreme Area in Wireless Sensor Networks,” J Phys Conf Ser, vol. 1244, no. 1, Jun. 2019, doi: 10.1088/1742-6596/1244/1/012013.
[26]D. W. Sambo, B. Yenke, A. Förster, P. D.- Sensors, and undefined 2019, “Optimized clustering algorithms for large wireless sensor networks: A review,” mdpi.com, doi: 10.3390/s19020322.
[27]J. Liu and F. Xu, “Research on trust-based secure routing in wireless sensor networks,” https://doi.org/10.1117/12.2672753, vol. 12610, pp. 942–948, Apr. 2023, doi: 10.1117/12.2672753.
[28]J. Paruvathavardhini, B. Sargunam, and R. Sudarmani, “A Review on Energy Efficient Routing Protocols and Security Techniques for Wireless Sensor Networks,” Applied Mechanics and Materials, vol. 912, pp. 55–75, Feb. 2023, doi: 10.4028/P-5S9P7J.
[29]T. Madhu Midhan, K. Devika, R. Rajakumar, R. Manikandan, K. Dinesh, and M. Sreedevi, “A review on Machine Learning based IDS approaches in Wireless sensor networks,” 2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023, pp. 1238–1243, 2023, doi: 10.1109/ICACCS57279.2023.10112982.
[30]V. K. Verma, S. Singh, and N. P. Pathak, “Analysis of scalability for AODV routing protocol in wireless sensor networks,” Optik (Stuttg), vol. 125, no. 2, pp. 748–750, Jan. 2014, doi: 10.1016/J.IJLEO.2013.07.041.
[31]D. W. Sambo, B. O. Yenke, A. Förster, and P. Dayang, “Optimized Clustering Algorithms for Large Wireless Sensor Networks: A Review,” Sensors 2019, Vol. 19, Page 322, vol. 19, no. 2, p. 322, Jan. 2019, doi: 10.3390/S19020322.
[32]X. Liu, J. Yu, F. Li, W. Lv, Y. Wang, and X. Cheng, “Data Aggregation in Wireless Sensor Networks: From the Perspective of Security,” IEEE Internet Things J, vol. 7, no. 7, pp. 6495–6513, Jul. 2020, doi: 10.1109/JIOT.2019.2957396.
[33]B. B. PGScholar and S. N. Asst Professor, “Preserving Privacy and Integrity in Wireless Sensor Network using Range Queries,” International Journal of Engineering Research & Technology, vol. 2, no. 13, Jul. 2018, doi: 10.17577/IJERTCONV2IS13075.
[34]E. Elmahdi, S. Yoo, … K. S.-… on I. of T., and undefined 2019, “Protecting Data Integrity for Multi-Application Environment in Wireless Sensor Networks,” ieeexplore.ieee.org, Accessed: Jul. 02, 2023. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8875502/
[35]M. S. Yousefpoor, E. Yousefpoor, H. Barati, A. Barati, A. Movaghar, and M. Hosseinzadeh, “Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review,” Journal of Network and Computer Applications, vol. 190, p. 103118, Sep. 2021, doi: 10.1016/J.JNCA.2021.103118.
[36]S. Subramani and M. Selvi, “Comprehensive review on distributed denial of service attacks in wireless sensor networks,” International Journal of Information and Computer Security, vol. 20, no. 3–4, pp. 414–438, 2023, doi: 10.1504/IJICS.2023.128828.
[37]K. Dhivyasri, A. Suphalakshmi, M. R.-Int. J. Res. Appl. Sci. Eng, and undefined 2020, “Wireless sensor network jammer attack: A detailed review,” academia.edu, Accessed: Jul. 10, 2023. [Online]. Available: https://www.academia.edu/download/64124956/844.pdf
[38]Z. Alansari, N. B. Anuar, A. Kamsin, and M. R. Belgaum, “A systematic review of routing attacks detection in wireless sensor networks,” PeerJ Comput Sci, vol. 8, p. e1135, Oct. 2022, doi: 10.7717/PEERJ-CS.1135/SUPP-1.
[39]T. Rathod et al., “Blockchain for Future Wireless Networks: A Decade Survey,” Sensors 2022, Vol. 22, Page 4182, vol. 22, no. 11, p. 4182, May 2022, doi: 10.3390/S22114182.
[40]Z. Xia, Z. Wei, and H. Zhang, “Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks,” Comput Intell Neurosci, vol. 2022, 2022, doi: 10.1155/2022/3449428.
[41]Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” Proceedings - 2017 IEEE 6th International Congress on Big Data, BigData Congress 2017, pp. 557–564, Sep. 2017, doi: 10.1109/BIGDATACONGRESS.2017.85.
[42]A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,” Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016, pp. 839–858, Aug. 2016, doi: 10.1109/SP.2016.55.
[43]A. S. Rajasekaran, M. Azees, and F. Al-Turjman, “A comprehensive survey on blockchain technology,” Sustainable Energy Technologies and Assessments, vol. 52, p. 102039, Aug. 2022, doi: 10.1016/J.SETA.2022.102039.
[44]Y. A. Omar, S. B. Goyal, and V. Varadarajan, “Apply Blockchain Technology for Security of IoT Devices,” 2021 IEEE International Conference on Emerging Trends in Industry 4.0, ETI 4.0 2021, 2021, doi: 10.1109/ETI4.051663.2021.9619295.
[45]M. Ali, I. A. Abd El-Moghith, M. N. El-Derini, and S. M. Darwish, “Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network.,” cdn.techscience.cn, doi: 10.32604/cmc.2022.021305.
[46]A. K. Dangi, G. A. Pandurang, G. V. Bachhav, M. K. Chakravarthi, A. Gehlot, and S. K. Shukla, “Blockchain Applications for Security Issues and Challenges in IOT,” 2023 International Conference on Artificial Intelligence and Smart Communication, AISC 2023, pp. 582–585, 2023, doi: 10.1109/AISC56616.2023.10085201.
[47]S. J. Hsiao and W. T. Sung, “Employing Blockchain Technology to Strengthen Security of Wireless Sensor Networks,” IEEE Access, vol. 9, pp. 72326–72341, 2021, doi: 10.1109/ACCESS.2021.3079708.
[48]C. V Nguyen, M. T. Nguyen, T. T. Le, T. A. Tran, and D. T. Nguyen, “Blockchain technology in wireless sensor network: benefits and challenges,” theblockchaintest.com, vol. X, No. Y, 2021, Accessed: Jul. 10, 2023. [Online]. Available: https://theblockchaintest.com/uploads/resources/Nguyen%20Le%20Tran%20-%20Blockchain%20Technology%20in%20Wireless%20Sensor%20Network%20-%202021%20Dec.pdf
[49]B. K. Chauhan and D. B. Patel, “A Systematic Review of Blockchain Technology to Find Current Scalability Issues and Solutions,” pp. 15–29, 2022, doi: 10.1007/978-981-16-3346-1_2.
[50]T. Singh, R. Vaid, and A. Sharma, “Security Issues in Blockchain Integrated WSN: Challenges and Concerns,” Proceedings of the 2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2022, 2022, doi: 10.1109/ICSES55317.2022.9914006.