A Novel Blockchain Approach for Improve the Performance of Network Security Using Polynomial Ephemeral Blockchain-Based Secure Routing in Wireless Sensor Network
{"title":"A Novel Blockchain Approach for Improve the Performance of Network Security Using Polynomial Ephemeral Blockchain-Based Secure Routing in Wireless Sensor Network","authors":"R. Bharanidharan","doi":"10.1166/JCTN.2020.9458","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are networks that include hundreds to thousands of autonomous distributed devices. These sensors are used to monitor physical and environmental conditions. Reliable routing protocols are designed to build a reliable and secure network with power management and\n control overhead and congestion. The wireless medium allows malicious user?s wireless sensor networks (WSN) to take part in actions to get a damaging attack on network control nodes. Due to the proprietary nature of such networks, they are more complex and lack tamper-resistant hardware. Security\n mechanisms are more wit due to the wireless and transient computing or communication complexity of communication relationships between nodes in a network. The existing method doesn?t provide security in inconvenient network performance, and the attackers modify the data and damage it. The\n proposed blockchain method is fixed at the same level of security, such as Polynomial Ephemeral Blockchain-based Secure Routing (PEBSR) encryption, to create a secure network. In this method, first, to authenticate the neighbor node validate using a Polynomial Ephemeral key-based Neighbor\n node authentication method. It evaluates the node location trust node and distributes the Ephemeral key in this key established between the nodes to communicate securely. The second method provides a cryptography chain network, and it maintains each node information in the sink database in\n this process if any attacker or anyone modifies the data is stored on each individual database. Finally, to find the route between each sink and participate nodes in the network. In this proposed PEBSR method, simulation results in providing efficient security, throughput, and less response\n time; they are compared to the existing method.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5598-5604"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computational and Theoretical Nanoscience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1166/JCTN.2020.9458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Chemistry","Score":null,"Total":0}
引用次数: 1
Abstract
Wireless sensor networks are networks that include hundreds to thousands of autonomous distributed devices. These sensors are used to monitor physical and environmental conditions. Reliable routing protocols are designed to build a reliable and secure network with power management and
control overhead and congestion. The wireless medium allows malicious user?s wireless sensor networks (WSN) to take part in actions to get a damaging attack on network control nodes. Due to the proprietary nature of such networks, they are more complex and lack tamper-resistant hardware. Security
mechanisms are more wit due to the wireless and transient computing or communication complexity of communication relationships between nodes in a network. The existing method doesn?t provide security in inconvenient network performance, and the attackers modify the data and damage it. The
proposed blockchain method is fixed at the same level of security, such as Polynomial Ephemeral Blockchain-based Secure Routing (PEBSR) encryption, to create a secure network. In this method, first, to authenticate the neighbor node validate using a Polynomial Ephemeral key-based Neighbor
node authentication method. It evaluates the node location trust node and distributes the Ephemeral key in this key established between the nodes to communicate securely. The second method provides a cryptography chain network, and it maintains each node information in the sink database in
this process if any attacker or anyone modifies the data is stored on each individual database. Finally, to find the route between each sink and participate nodes in the network. In this proposed PEBSR method, simulation results in providing efficient security, throughput, and less response
time; they are compared to the existing method.