Abstract
The evolution of sensor-based IoT technologies has presented the research community with new service exigencies such as service availability in a decentralized fashion, immutability and network transparency by utilizing available scarce resources. Adopting conventional security mechanisms on these devices has exposed devices and the networks to a myriad of attacks, hence in order to overcome these challenges a hybrid block chain-based security solution along with black widow optimization-based clustering is adopted for IoT networks. The comparison of security and the analysis of the newly developed model confirms the improvement of quantity of messages that each node in the network handles, packet loss rate and throughput, when simulated using network simulator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jain SK, Garg K (2009) A hybrid model of defense techniques against base station Jamming attack in wireless sensor networks. In: First international conference on computational intelligence, communication systems and networks, Indore, pp 102–107. https://doi.org/10.1109/CICSYN.2009.57
Chen J, Zhang H, Du X, Fang B, Liu Y, Yu H (2012)Base station location protection in wireless sensor networks: attacks and defense. In: IEEE International Conference on Communications (ICC), Ottawa, ON, pp 554–559. https://doi.org/10.1109/ICC.2012.6364186
Christidis K, Devetsikiotis M Blockchains and smart contracts for the Internet of Things. IEEEAccess 4:1–1. https://doi.org/10.1109/ACCESS.2016.2566339
Moinet A, Darties B, Baril J (2017) Blockchain based trust and authentication for decentralized sensor networks. CoRR abs/1706.01730
Cui Z et al (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251
Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur Commun Netw 9(18):5943–5964. https://doi.org/10.1002/sec.1748
Xu M et al (2020) On cloud storage optimization of blockchain with a clustering-based genetic algorithm. IEEE Internet Things J
Saad M, Thai MT, Mohaisen A (2018) POSTER: deterring ddos attacks on blockchain-based cryptocurrencies through mempool optimization. In: Proceedings of the 2018 on Asia conference on computer and communications security
Haseeb K et al (2019) Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. IEEE Access 7:185496–185505
Ren Y et al (2018) Incentive mechanism of data storage based on blockchain for wireless sensor networks. Mobile Inf Syst 2018
Liu M et al (2019) Performance optimization for blockchain-enabled industrial Internet of Things (IIoT) systems: a deep reinforcement learning approach. IEEE Trans Industr Inf 15(6):3559–3570
Hayyolalam V, Pourhaji Kazem AA (2020) Black widow optimization algorithm: a novel meta-heuristic approach for solving engineering optimization problems. Eng Appl Artif Intell 87:103249. https://doi.org/10.1016/j.engappai.2019.103249
She W, Liu Q, Tian Z, Chen J, Wang B, Liu W Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7. https://doi.org/10.1109/access.2019.2902811
Lara-Nino CA, Diaz-Perez A, Morales-Sandoval M (2018) Energy and area costs of lightweight cryptographic algorithms for authenticated encryption in WSN. Secur Commun Netw 2018:1–14. https://doi.org/10.1155/2018/5087065
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Revanesh, M., Sridhar, V. (2022). Hierarchical Block Chain-Based Authentication Management Scheme for IoT Devices. In: Shetty, N.R., Patnaik, L.M., Nagaraj, H.C., Hamsavath, P.N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Lecture Notes in Electrical Engineering, vol 790. Springer, Singapore. https://doi.org/10.1007/978-981-16-1342-5_41
Download citation
DOI: https://doi.org/10.1007/978-981-16-1342-5_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1341-8
Online ISBN: 978-981-16-1342-5
eBook Packages: EngineeringEngineering (R0)