An artificial intelligence based authentication mechanism for wireless sensor networks using blockchain

被引:1
|
作者
Devi, Suman [1 ]
Kumar, Avadhesh [1 ]
机构
[1] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida 203201, Uttar Pradesh, India
来源
关键词
Blockchain; Devices; Private blockchain; Public blockchain; Security; SPBO; SECURITY; TECHNOLOGY; SYSTEMS;
D O I
10.47974/JIOS-1596
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Blockchain Networks (BNs) are widely used in a variety of applications around the globe. BN exchanges data and information using various inter-network and intra-network protocols. The sharing of this information across multiple platforms poses a significant security threat to the data sensed by the devices. This paper uses a combination of blockchain technology with AI algorithms to propose a novel security framework for BNs that acts as a security check gateway for any third party trying to access BN data. This paper proposed a hybrid security framework using blockchain. In order to provide a clear and efficient authentication scheme, global blockchain and local blockchain are separately used for BN authentication. The proposed work uses an artificial intelligence (AI) approach - Student Psychology Based Optimization (SPBO) is implemented in Matlab and Python. This approach is compared with some famous security algorithms of BNs, and it performs better than all the existing security algorithms used for BN.
引用
收藏
页码:581 / 594
页数:14
相关论文
共 50 条
  • [31] A Perturbed Compressed Sensing based Authentication Mechanism in Multi-hop Wireless Sensor Networks
    Huang, Hui
    Huang, Feng
    Li, Chunlong
    Yuan, Xiaoming
    Zhai, Xiangping
    Hao, Jie
    2018 IEEE SYMPOSIUM ON PRODUCT COMPLIANCE ENGINEERING - ASIA 2018 (IEEE ISPCE-CN 2018), 2018, : 67 - 71
  • [32] Using artificial intelligence in routing schemes for wireless networks
    Barbancho, Julio
    Leon, Carlos
    Molina, F. J.
    Barbancho, Antonio
    COMPUTER COMMUNICATIONS, 2007, 30 (14-15) : 2802 - 2811
  • [33] Authentication protocol for wireless sensor networks
    Gupta, Sunil
    Verma, Harsh Kumar
    Sangal, Al
    World Academy of Science, Engineering and Technology, 2010, 66 : 643 - 649
  • [34] Fast authentication in wireless sensor networks
    Benzaid, Chafika
    Lounis, Karim
    Al-Nemrat, Ameer
    Badache, Nadjib
    Alazab, Mamoun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 362 - 375
  • [35] Authentication of Mobile Wireless Sensor Networks
    Abd-Eldayem, Sanaa. S.
    Rizk, M. R. M.
    Mokhtar, M. A.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET), 2016, : 71 - 76
  • [36] On broadcast authentication in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zeng, Kai
    Moran, Patrick J.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) : 4136 - 4144
  • [37] Authentication protocol for wireless sensor networks
    Gupta, Sunil
    Verma, Harsh Kumar
    Sangal, A.L.
    World Academy of Science, Engineering and Technology, 2010, 42 : 630 - 636
  • [38] Challenges and Authentication in Wireless Sensor Networks
    Jayanthiladevi, A.
    Suma, S.
    Lalitha, T.
    2013 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN VLSI, EMBEDDED SYSTEM, NANO ELECTRONICS AND TELECOMMUNICATION SYSTEM (ICEVENT 2013), 2013,
  • [39] On broadcast authentication in wireless sensor networks
    Ren, Kui
    Zeng, Kai
    Lou, Wenjing
    Moran, Patrick J.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 502 - 514
  • [40] Authentication Schemes for Wireless Sensor Networks
    Tajeddine, Ayman
    Kayssi, Ayman
    Chehab, Ali
    Elhajj, Imad
    2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 367 - 372