Skip to main content

Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 1122)


Internet of Things (IoT) has garnered a good chunk of limelight with the emerging advancements in technologies. It comprises of heterogeneous devices embedded with sensors, which are able to communicate directly with each other without any human intervention. In this paper, a survey has been done on authentication and privacy in IoT using Blockchain during Forest Fire. The purpose of Blockchain is to design a data structure to construct a distributed ledger of transactions that cannot be tampered by any third party. The blockchain forms by cryptographically linked blocks of transactions. Public-key cryptography is used to sign transactions among users in blockchain technology. It achieves privacy very strongly as it is very difficult to modify or delete blocks of data which are stored in the ledger of blockchain.


  • IoT
  • Blockchain
  • Forest Fire
  • Validation
  • Privacy

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions


  1. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 787–2805 (2010)

    CrossRef  Google Scholar 

  2. Satendra, Kaushik, A.D.: Forest Fire Diaster Management. Published by National Institute of Disaster Management, Ministry of Home Affairs, New Delhi (2014)

    Google Scholar 

  3. Hefeeda, M.: Forest fire modeling and early detection using wireless sensor networks. ACM J. 5 (2009)

    Google Scholar 

  4. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-keycryptosystems. Proc. CACM 21, 120–126 (1978)

    CrossRef  Google Scholar 

  5. Sun, H.-M., Wu, M.-E.: An Approach Towards Rebalanced RSA-CRT with Short Public Exponent. Cryptology, ePrint Archive: Report 2005/053 (2005).

  6. Wu, C.-H., Hong, J.-H., Wu, C.-W.: RSA cryptosystem design based on the Chinese remainder theorem. In: Proceedings of 2001 Asia and South Pacific Design Automation Conference ASP-DAC 2001. ACM, New York (2001)

    Google Scholar 

  7. Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of CCS06, Alexandria, Virginia, USA. ACM 1-59593- 518-5/06/0010 (2006)

    Google Scholar 

  8. Karunakaran, S., Thangara, P.: An adaptive weighted cluster based routing (AWCBRP) protocol for mobile ad-hoc networks. J. WSEAS Trans. Commun. 7, 248–257 (2008)

    Google Scholar 

  9. Zheng, Z., Wu, Z., Lin, H., Zheng, K.: CRAM: an energy efficient routing algorithm for wireless sensor networks. In: Proceedings of 19th International Symposium, Kemer-Antalya, Turkey (2004)

    Google Scholar 

  10. Liu, C., Wu, J.: Scalable routing in delay tolerant network. In: Proceedings of MobiHoc 2007 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 51–60. ACM Digital Library (2007). ISBN 978-1-59593-684-4

  11. Chauhan, N., Awasthi, L.K., Chand, N., Chugh, A.: A distributed weighted cluster based routing protocol for MANETs. In: Proceedings of Second International Conference on Advances in Communication, Network and Computing, CNC 2011, Bangalore, India. CCIS, vol. 142, pp. 147–151. Springer, Heidelberg (2011)., ISBN 978-3-642-19541-9 (print), 978-3-642-19542-6 (online)

    Google Scholar 

  12. Majumder, A., Sarma, N.: DEMAC: a cluster-based topology control for ad hoc networks. IJCSI – Int. J. Comput. Sci. Issues 7(5), 82–88 (2010). ISSN (Online) 1694-0814

    Google Scholar 

  13. Jiang, M., Li, J., Tay, Y.C.: Cluster based routing protocol (CBRP). In: INTERNET-DRAFT draft-ietf-manet-cbrp-spec01.tx, July 1999

    Google Scholar 

  14. Hossein, O., Saadawi, T.: Ant routing algorithm for mobile ad hoc networks (ARAMA). In: Proceedings of 22nd IEEE International Performance, Computing, and Communications Conference, April 2003, Phoenix, Arizona, USA, pp. 281–290 (2003)

    Google Scholar 

  15. Gunes, M., Sorges, U., Bouazizi, I.: ARA- the ant colony based routing algorithm for MANET. In: Proceedings of International Workshop on Ad-hoc Networking (IWAHN 2002), pp. 18–22, August 2002

    Google Scholar 

  16. Dorigo, M.: Ant colony optimization. In Dynamic Routing in Traffic Networks Using AntNet

  17. Ducatelle, F., De Caro, G., Gamardella, L.M.: Ant agents for hybrid multipath routing in MANETs. IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland (2005)

    Google Scholar 

  18. Camilo, T., Carreto, C., Silva, J.S., Boavida, F.: An energy-efficient ant-based routing algorithm for wireless sensor networks (2006)

    CrossRef  Google Scholar 

  19. Ghazy, A.M., Fatma, E.L.L., Hefny, H.A.: Threshold based AntNet algorithm for dynamic traffic routing of road networks Egypt. Inform. J. 13, 111–121 (2012)

    CrossRef  Google Scholar 

  20. Lu, Y., Zhao, G., Su, F.: Adaptive ant-based dynamic routing algorithm (2004)

    Google Scholar 

  21. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System

    Google Scholar 

  22. Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. Commun. Surv. Tutorials 20, 3416–3452 (2018)

    CrossRef  Google Scholar 

  23. Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger Eip-150 Revision

    Google Scholar 

  24. Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems (2017)

    Google Scholar 

  25. Adam Back: Hashcash - A Denial of Service Counter-Measure.

  26. Cachin, C.: Architecture of the Hyperledger Blockchain Fabric.

  27. Gideon Greenspan, Founder and CEO, Coin Sciences Ltd, “MultiChain Private Blockchain—White Paper”.

  28. Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain distributed solution to automated security and privacy.

  29. Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system (2019)

    Google Scholar 

  30. Roulin, C., Dorri, A., Jurdak, R., Kanhere, S.S.: On the Activity Privacy of Blockchain for IoT.

  31. Eyal, I., Sirer, E.G.: Majority is not Enough: Bitcoin Mining is Vulnerable.

  32. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System.

  33. Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A Survey on Security and Privacy Issues of Bitcoin.

  34. Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78 (2018).

    CrossRef  Google Scholar 

  35. Christidis, K.: Blockchains and Smart Contracts for the Internet of Things.

  36. Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT.

  37. Sharma, H.J., Dhawan, A.: An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks (2013)

    Google Scholar 

  38. Douceur, J.R.: The Sybil attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 792–796 (2013)

    MATH  Google Scholar 

  39. Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. 6, 379–387 (2018)

    CrossRef  Google Scholar 

  40. Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security, pp. 507–527. Springer, Heidelberg (2015)

    CrossRef  Google Scholar 

  41. Bochem, A., Leiding, B., Hogrefe, D.: Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. SecureComm (2018)

    Google Scholar 

  42. Aydos, M., Sunar, B., Koc, C.K.: An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998)

    Google Scholar 

  43. Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: Ring CT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: SCOPUS. LNCS (LNAI, LNB), vol. 10493, pp. 456–474. Springer, Heidelberg (2017)

    CrossRef  Google Scholar 

Download references


This research is funded in parts by DST/SERB project ECR/2017/000983 grants. The authors are grateful to DST/SERB for the support.

Author information

Authors and Affiliations


Corresponding author

Correspondence to Sreemana Datta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Datta, S., Das, A.K., Kumar, A., Khushboo, Sinha, D. (2020). Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review. In: Nain, N., Vipparthi, S. (eds) 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019. ICIoTCT 2019. Advances in Intelligent Systems and Computing, vol 1122. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-39874-3

  • Online ISBN: 978-3-030-39875-0

  • eBook Packages: EngineeringEngineering (R0)