Skip to main content

Hierarchical Block Chain-Based Authentication Management Scheme for IoT Devices

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 790))

Abstract

The evolution of sensor-based IoT technologies has presented the research community with new service exigencies such as service availability in a decentralized fashion, immutability and network transparency by utilizing available scarce resources. Adopting conventional security mechanisms on these devices has exposed devices and the networks to a myriad of attacks, hence in order to overcome these challenges a hybrid block chain-based security solution along with black widow optimization-based clustering is adopted for IoT networks. The comparison of security and the analysis of the newly developed model confirms the improvement of quantity of messages that each node in the network handles, packet loss rate and throughput, when simulated using network simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain SK, Garg K (2009) A hybrid model of defense techniques against base station Jamming attack in wireless sensor networks. In: First international conference on computational intelligence, communication systems and networks, Indore, pp 102–107. https://doi.org/10.1109/CICSYN.2009.57

  2. Chen J, Zhang H, Du X, Fang B, Liu Y, Yu H (2012)Base station location protection in wireless sensor networks: attacks and defense. In: IEEE International Conference on Communications (ICC), Ottawa, ON, pp 554–559. https://doi.org/10.1109/ICC.2012.6364186

  3. Christidis K, Devetsikiotis M Blockchains and smart contracts for the Internet of Things. IEEEAccess 4:1–1. https://doi.org/10.1109/ACCESS.2016.2566339

  4. Moinet A, Darties B, Baril J (2017) Blockchain based trust and authentication for decentralized sensor networks. CoRR abs/1706.01730

    Google Scholar 

  5. Cui Z et al (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251

    Google Scholar 

  6. Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur Commun Netw 9(18):5943–5964. https://doi.org/10.1002/sec.1748

    Article  Google Scholar 

  7. Xu M et al (2020) On cloud storage optimization of blockchain with a clustering-based genetic algorithm. IEEE Internet Things J

    Google Scholar 

  8. Saad M, Thai MT, Mohaisen A (2018) POSTER: deterring ddos attacks on blockchain-based cryptocurrencies through mempool optimization. In: Proceedings of the 2018 on Asia conference on computer and communications security

    Google Scholar 

  9. Haseeb K et al (2019) Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. IEEE Access 7:185496–185505

    Google Scholar 

  10. Ren Y et al (2018) Incentive mechanism of data storage based on blockchain for wireless sensor networks. Mobile Inf Syst 2018

    Google Scholar 

  11. Liu M et al (2019) Performance optimization for blockchain-enabled industrial Internet of Things (IIoT) systems: a deep reinforcement learning approach. IEEE Trans Industr Inf 15(6):3559–3570

    Google Scholar 

  12. Hayyolalam V, Pourhaji Kazem AA (2020) Black widow optimization algorithm: a novel meta-heuristic approach for solving engineering optimization problems. Eng Appl Artif Intell 87:103249. https://doi.org/10.1016/j.engappai.2019.103249

    Article  Google Scholar 

  13. She W, Liu Q, Tian Z, Chen J, Wang B, Liu W Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7. https://doi.org/10.1109/access.2019.2902811

  14. Lara-Nino CA, Diaz-Perez A, Morales-Sandoval M (2018) Energy and area costs of lightweight cryptographic algorithms for authenticated encryption in WSN. Secur Commun Netw 2018:1–14. https://doi.org/10.1155/2018/5087065

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Revanesh, M., Sridhar, V. (2022). Hierarchical Block Chain-Based Authentication Management Scheme for IoT Devices. In: Shetty, N.R., Patnaik, L.M., Nagaraj, H.C., Hamsavath, P.N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Lecture Notes in Electrical Engineering, vol 790. Springer, Singapore. https://doi.org/10.1007/978-981-16-1342-5_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-1342-5_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-1341-8

  • Online ISBN: 978-981-16-1342-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics