Employing Blockchain Technology to Strengthen Security of Wireless Sensor Networks

The proposed approach uses blockchain-based technology to strengthen the data security of wireless sensor networks (WSNs). This paper integrates blockchain-based technology with data transfer to establish an extremely secure WSNs structure. The present wireless network is built on the architecture of the Internet of Things (IoT) and employs a blockchain-based method to make the reliability of data transmission strong. In this proposed research, many small-area wireless sensor networks establish the entire WSNs structure, and every small-area wireless sensor network has a primary data collection node called a “mobile database.” The “mobile database” node of this study uses embedded microcontrollers with an operating system, such as Raspberry Pi and Arduino Yun. This block contains the sensor data collected by itself and the hash value of the previous block. Then the hash value of its own block, which is also part of the hash calculation of the next block, was calculated through the mining calculation program. Any block in the proposed method includes the encrypted hash-value of the previous block, the current timestamp, and the transaction data. In our research content, the transaction data is represented as wireless network sensing data. Basically, the system employs the hash function for calculation using the Merkel-tree algorithm. Such programming makes the block with blockchain-based technology difficult to tamper with content. This study approach revises the blockchain-based transaction ledger to become a sensor data record. Therefore, the proposed system gathers and analyzes sensor data for more reliability in the wireless sensing network structure. Furthermore, the innovative system with blockchain-based technology can treat a private cloud-end. This paper also carries on to visualize the uploaded sensing data by the sensors and draws corresponding charts based on big data analysis. The wireless network architecture proposed in this paper is built on embedded devices, making it easy for the system to build a web server. Using Python or JavaScript programming language in the web environment is relatively more convenient for data visualization and data analysis. Finally, this study uses traditional methods and innovative methods to compare data transmission. When the system uses innovative methods with blockchain-based technology, it is almost impossible for any operator to tamper with the data transmitted by the sensor.

[1]  Anand D. Sarwate,et al.  Large scale collaboration with autonomy: Decentralized data ICA , 2015, 2015 IEEE 25th International Workshop on Machine Learning for Signal Processing (MLSP).

[2]  Rui Guo,et al.  Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.

[3]  Yue Wang,et al.  Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G , 2017, IET Commun..

[4]  Khashayar Kotobi,et al.  Blockchain-enabled spectrum access in cognitive radio networks , 2017, 2017 Wireless Telecommunications Symposium (WTS).

[5]  Jianzhong Wu,et al.  Automation of the supplier role in the GB power system using blockchain based smart contracts , 2017 .

[6]  Morgen E. Peck,et al.  Blockchain world - Do you need a blockchain? This chart will tell you if the technology can solve your problem , 2017, IEEE Spectrum.

[7]  Deepak Puthal,et al.  The Blockchain as a Decentralized Security Framework [Future Directions] , 2018, IEEE Consumer Electronics Magazine.

[8]  Hendrawan,et al.  Calculation of encryption algorithm combination for video encryption using two layers of AHP , 2016, 2016 10th International Conference on Telecommunication Systems Services and Applications (TSSA).

[9]  L. Arockiam,et al.  Enhanced encryption algorithm (EEA) for protecting users' credentials in public cloud , 2017, 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET).

[10]  Anamika Sharma,et al.  Sensor Fusion for Distributed Detection of Mobile Intruders in Surveillance Wireless Sensor Networks , 2020, IEEE Sensors Journal.

[11]  Feng Sheng Wu Research of Cloud Platform Data Encryption Technology Based on ECC Algorithm , 2018, 2018 International Conference on Virtual Reality and Intelligent Systems (ICVRIS).

[12]  Jianming Zhu,et al.  Data Sharing and Tracing Scheme Based on Blockchain , 2018, 2018 8th International Conference on Logistics, Informatics and Service Sciences (LISS).

[13]  Xiwei Xu,et al.  Adaptable Blockchain-Based Systems: A Case Study for Product Traceability , 2017, IEEE Software.

[14]  Lei Zou,et al.  Single Hash: Use One Hash Function to Build Faster Hash Based Data Structures , 2018, 2018 IEEE International Conference on Big Data and Smart Computing (BigComp).

[15]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[16]  Masakatu Morii,et al.  Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks , 2015, 2015 Third International Symposium on Computing and Networking (CANDAR).

[17]  Deepak Puthal,et al.  The Blockchain as a Decentralized Security Framework , 2018 .

[18]  PRADIP KUMAR SHARMA,et al.  A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.

[19]  Jaewook Lee,et al.  An Empirical Study on Modeling and Prediction of Bitcoin Prices With Bayesian Neural Networks Based on Blockchain Information , 2018, IEEE Access.

[20]  Xiaojiang Du,et al.  Consortium Blockchain-Based Malware Detection in Mobile Devices , 2018, IEEE Access.

[21]  Shun-Yuan Wang,et al.  Integrating Blockchain Technology for Data Collection and Analysis in Wireless Sensor Networks with an Innovative Implementation , 2018, 2018 International Symposium on Computer, Consumer and Control (IS3C).

[22]  Mohammed Atiquzzaman,et al.  Data Collection for Security Measurement in Wireless Sensor Networks: A Survey , 2019, IEEE Internet of Things Journal.

[23]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[24]  Jong-Hyouk Lee,et al.  BIDaaS: Blockchain Based ID As a Service , 2018, IEEE Access.

[25]  Ashiq Anjum,et al.  Blockchain Standards for Compliance and Trust , 2017, IEEE Cloud Computing.

[26]  M. Peck,et al.  Energy trading for fun and profit buy your neighbor's rooftop solar power or sell your own-it'll all be on a blockchain , 2017, IEEE Spectrum.

[27]  Qiaoyan Wen,et al.  An Anti-Quantum Transaction Authentication Approach in Blockchain , 2018, IEEE Access.

[28]  Roland Dobai,et al.  Evolutionary design of hash functions for IP address hashing using genetic programming , 2017, 2017 IEEE Congress on Evolutionary Computation (CEC).

[29]  Peter Fairley,et al.  Blockchain world - Feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous , 2017, IEEE Spectrum.

[30]  Adnan Yazici,et al.  Security attacks and countermeasures in Surveillance Wireless Sensor Networks , 2015, 2015 9th International Conference on Application of Information and Communication Technologies (AICT).

[31]  Samuel K. Moore,et al.  The blossoming of the blockchain , 2017, IEEE Spectrum.

[32]  Amy Nordrum,et al.  Govern by blockchain dubai wants one platform to rule them all, while Illinois will try anything , 2017, IEEE Spectrum.

[33]  Mohammad Shahidehpour,et al.  Decentralized Optimization of Multi-Area Electricity-Natural Gas Flows Based on Cone Reformulation , 2018, IEEE Transactions on Power Systems.

[34]  Jiannong Cao,et al.  Decentralized Context Sharing in Vehicular Delay Tolerant Networks with Compressive Sensing , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[35]  Jiaheng Wang,et al.  Blockchain Radio Access Network (B-RAN): Towards Decentralized Secure Radio Access Paradigm , 2019, IEEE Access.

[36]  Adnan Yazici,et al.  A Fusion-Based Framework for Wireless Multimedia Sensor Networks in Surveillance Applications , 2019, IEEE Access.

[37]  Qi Xia,et al.  GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid , 2018, IEEE Access.

[38]  Khashayar Kotobi,et al.  Secure Blockchains for Dynamic Spectrum Access: A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access , 2018, IEEE Vehicular Technology Magazine.

[39]  Yu Xu,et al.  A consensus and incentive program for charging piles based on consortium blockchain , 2018, CSEE Journal of Power and Energy Systems.

[40]  A. N. Berezin,et al.  Randomized pseudo-probabilistic encryption algorithms , 2017, 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM).

[41]  Jianfeng Ma,et al.  Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network , 2018, IEEE Access.

[42]  Yong Yu,et al.  Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems , 2018, IEEE Access.

[43]  Soo Young Shin,et al.  Blockchain Based Secure Data Handover Scheme in Non-Orthogonal Multiple Access , 2018, 2018 4th International Conference on Wireless and Telematics (ICWT).