inis 22(32): 3

Research Article

A Framework of Deploying Blockchain in Wireless Sensor Networks

Download39 downloads
  • @ARTICLE{10.4108/eetinis.v9i32.1125,
        author={Minh Nguyen and Cuong Nguyen and Hoang T. Tran},
        title={A Framework of Deploying Blockchain in Wireless Sensor Networks},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={9},
        number={32},
        publisher={EAI},
        journal_a={INIS},
        year={2022},
        month={8},
        keywords={Blockchain, Blockchain in WSNs, Centralize, Distributed},
        doi={10.4108/eetinis.v9i32.1125}
    }
    
  • Minh Nguyen
    Cuong Nguyen
    Hoang T. Tran
    Year: 2022
    A Framework of Deploying Blockchain in Wireless Sensor Networks
    INIS
    EAI
    DOI: 10.4108/eetinis.v9i32.1125
Minh Nguyen1,*, Cuong Nguyen2, Hoang T. Tran3
  • 1: hai Nguyen University of Technology, Viet Nam
  • 2: Thai Nguyen University of Information and Communication Technology, Viet Nam
  • 3: Duy Tan University
*Contact email: nguyentuanminh@tnut.edu.vn

Abstract

The most critical needs for wireless sensor networks (WSNs) are security, privacy, dependability, and autonomy. The networks might be vulnerable to hostile users and harmful usage if these problems are not ensured. Attacks and hazards are higher with centralized WSNs, particularly when data is shared with other businesses and sent between devices. In this paper, a WSN model with integrated blockchain security technology is proposed. Blockchains store the identity of each node. The validation is done by public blockchains and private blockchains. For sensor nodes, the authentication is implemented on the private blockchain. The public blockchain is used to authenticate cluster heads. Performing network attacks can easily be performed by unregistered nodes to access resources in the network. Broadcasting false information on the path of malicious nodes can increase packet latency and reduce packet delivery rate. In this paper, the model recommends the most secure nodes in the network to be used for secure routing. The main purpose is to reduce the attack of hackers from outside the network, improve the efficiency of detecting malicious nodes.