{"title":"基于区块链的安全 LEACH 协议(BSLEACH)","authors":"Shubham Kant Ajay, Ditipriya Sinha, Raj Vikram, Ayan Kumar Das, Ramjee Prasad","doi":"10.1007/s11277-024-11546-w","DOIUrl":null,"url":null,"abstract":"<p>In Wireless Sensor Networks (WSNs), malicious nodes can infiltrate the network at any time, compromising network performance. Developing a secure routing protocol is critical for ensuring reliable data transmission. LEACH (Low-Energy Adaptive Clustering Hierarchy) is a well-established hierarchical routing protocol within the WSN paradigm. However, LEACH lacks robustness against security attacks due to the absence of integrated security mechanisms, making it vulnerable in the presence of malicious nodes. On the other hand, Blockchain, an emerging technology, is best suited for Wireless Sensor Networks due to its distributed, decentralized, immutable, and traceability features. Integrating blockchain with WSNs significantly enhances security, data integrity, and decentralization within the network. Integrating blockchain technology with WSNs significantly enhances security, data integrity, and decentralization within the network. In this paper, we introduce a Blockchain-enabled secure LEACH protocol to ensure reliable data transmission in wireless sensor networks. The proposed hybrid blockchain framework includes three phases: Registration, Authentication, and Malicious Node Detection. By utilizing the autonomous execution capabilities of smart contracts without third-party intervention, we develop specific smart contracts for the registration of cluster heads and ordinary nodes, for authentication between cluster heads and their corresponding ordinary nodes, and for the identification and elimination of malicious cluster head nodes. A detailed security analysis of the proposed BSLEACH framework is provided to provide its robustness against different network attacks such as Man-in-the-Middle attack, Sybil attack, Replay attack and non-repudiation.In performance evaluation, it is observed that the proposed Blockchain-based Secured LEACH (BSLEACH) protocol outperforms other versions of LEACH such as Sleach (Secure low-energy adaptive clustering hierarchy) and Ms-leach (A routing protocol combining multi-hop transmissions and Single-hop transmissions) in the presence of malicious cluster heads and Sybil nodes in the network. The proposed solution improves the performance of the traditional LEACH protocol by identifying and removing malicious Cluster head units from the Private Blockchain network.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":1.9000,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Blockchain-Based Secured LEACH Protocol (BSLEACH)\",\"authors\":\"Shubham Kant Ajay, Ditipriya Sinha, Raj Vikram, Ayan Kumar Das, Ramjee Prasad\",\"doi\":\"10.1007/s11277-024-11546-w\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>In Wireless Sensor Networks (WSNs), malicious nodes can infiltrate the network at any time, compromising network performance. Developing a secure routing protocol is critical for ensuring reliable data transmission. LEACH (Low-Energy Adaptive Clustering Hierarchy) is a well-established hierarchical routing protocol within the WSN paradigm. However, LEACH lacks robustness against security attacks due to the absence of integrated security mechanisms, making it vulnerable in the presence of malicious nodes. On the other hand, Blockchain, an emerging technology, is best suited for Wireless Sensor Networks due to its distributed, decentralized, immutable, and traceability features. Integrating blockchain with WSNs significantly enhances security, data integrity, and decentralization within the network. Integrating blockchain technology with WSNs significantly enhances security, data integrity, and decentralization within the network. In this paper, we introduce a Blockchain-enabled secure LEACH protocol to ensure reliable data transmission in wireless sensor networks. The proposed hybrid blockchain framework includes three phases: Registration, Authentication, and Malicious Node Detection. By utilizing the autonomous execution capabilities of smart contracts without third-party intervention, we develop specific smart contracts for the registration of cluster heads and ordinary nodes, for authentication between cluster heads and their corresponding ordinary nodes, and for the identification and elimination of malicious cluster head nodes. A detailed security analysis of the proposed BSLEACH framework is provided to provide its robustness against different network attacks such as Man-in-the-Middle attack, Sybil attack, Replay attack and non-repudiation.In performance evaluation, it is observed that the proposed Blockchain-based Secured LEACH (BSLEACH) protocol outperforms other versions of LEACH such as Sleach (Secure low-energy adaptive clustering hierarchy) and Ms-leach (A routing protocol combining multi-hop transmissions and Single-hop transmissions) in the presence of malicious cluster heads and Sybil nodes in the network. The proposed solution improves the performance of the traditional LEACH protocol by identifying and removing malicious Cluster head units from the Private Blockchain network.</p>\",\"PeriodicalId\":23827,\"journal\":{\"name\":\"Wireless Personal Communications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2024-09-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Personal Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11277-024-11546-w\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11546-w","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
In Wireless Sensor Networks (WSNs), malicious nodes can infiltrate the network at any time, compromising network performance. Developing a secure routing protocol is critical for ensuring reliable data transmission. LEACH (Low-Energy Adaptive Clustering Hierarchy) is a well-established hierarchical routing protocol within the WSN paradigm. However, LEACH lacks robustness against security attacks due to the absence of integrated security mechanisms, making it vulnerable in the presence of malicious nodes. On the other hand, Blockchain, an emerging technology, is best suited for Wireless Sensor Networks due to its distributed, decentralized, immutable, and traceability features. Integrating blockchain with WSNs significantly enhances security, data integrity, and decentralization within the network. Integrating blockchain technology with WSNs significantly enhances security, data integrity, and decentralization within the network. In this paper, we introduce a Blockchain-enabled secure LEACH protocol to ensure reliable data transmission in wireless sensor networks. The proposed hybrid blockchain framework includes three phases: Registration, Authentication, and Malicious Node Detection. By utilizing the autonomous execution capabilities of smart contracts without third-party intervention, we develop specific smart contracts for the registration of cluster heads and ordinary nodes, for authentication between cluster heads and their corresponding ordinary nodes, and for the identification and elimination of malicious cluster head nodes. A detailed security analysis of the proposed BSLEACH framework is provided to provide its robustness against different network attacks such as Man-in-the-Middle attack, Sybil attack, Replay attack and non-repudiation.In performance evaluation, it is observed that the proposed Blockchain-based Secured LEACH (BSLEACH) protocol outperforms other versions of LEACH such as Sleach (Secure low-energy adaptive clustering hierarchy) and Ms-leach (A routing protocol combining multi-hop transmissions and Single-hop transmissions) in the presence of malicious cluster heads and Sybil nodes in the network. The proposed solution improves the performance of the traditional LEACH protocol by identifying and removing malicious Cluster head units from the Private Blockchain network.
期刊介绍:
The Journal on Mobile Communication and Computing ...
Publishes tutorial, survey, and original research papers addressing mobile communications and computing;
Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia;
Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.;
98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again.
Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures.
In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment.
The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.