A Blockchain-Based Deep-Learning-Driven Architecture for Quality Routing in Wireless Sensor Networks

被引:12
|
作者
Khan, Zahoor Ali [1 ]
Amjad, Sana [2 ]
Ahmed, Farwa [3 ]
Almasoud, Abdullah M. [4 ]
Imran, Muhammad [5 ]
Javaid, Nadeem [2 ]
机构
[1] Higher Coll Technol, Dept Comp Informat Sci, Fujairah, U Arab Emirates
[2] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad 44000, Pakistan
[3] South East Tech Univ, Dept Aerosp Mech & Elect Engn, Waterford X91 K0EK, Ireland
[4] Prince Sattam bin Abdulaziz Univ, Coll Engn, Dept Elect Engn, Al Kharj 11942, Saudi Arabia
[5] Federat Univ, Sch Engn Informat Technol & Phys Sci, Brisbane, Qld 4000, Australia
关键词
Blockchains; Wireless sensor networks; Internet of Things; Routing; Manganese; Security; Protocols; Artificial neural networks; Convolutional neural networks; ANN; CNN; LSTM; GRU; HMGEAR; LEACH; malicious nodes' detection; blockchain; FRAMEWORK; PROTOCOL; AUTHENTICATION; INTERNET;
D O I
10.1109/ACCESS.2023.3259982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, great importance has been given to wireless sensor networks (WSNs) as they play a significant role in facilitating the world with daily life services like healthcare, military, social products, etc. However, heterogeneous nature of WSNs makes them prone to various attacks, which results in low throughput, and high network delay and high energy consumption. In the WSNs, routing is performed using different routing protocols like low-energy adaptive clustering hierarchy (LEACH), heterogeneous gateway-based energy-aware multi-hop routing (HMGEAR), etc. In such protocols, some nodes in the network may perform malicious activities. Therefore, four deep learning (DL) techniques and a real-time message content validation (RMCV) scheme based on blockchain are used in the proposed network for the detection of malicious nodes (MNs). Moreover, to analyse the routing data in the WSN, DL models are trained on a state-of-the-art dataset generated from LEACH, known as WSN-DS 2016. The WSN contains three types of nodes: sensor nodes, cluster heads (CHs) and the base station (BS). The CHs after aggregating the data received from the sensor nodes, send it towards the BS. Furthermore, to overcome the single point of failure issue, a decentralized blockchain is deployed on CHs and BS. Additionally, MNs are removed from the network using RMCV and DL techniques. Moreover, legitimate nodes (LNs) are registered in the blockchain network using proof-of-authority consensus protocol. The protocol outperforms proof-of-work in terms of computational cost. Later, routing is performed between the LNs using different routing protocols and the results are compared with original LEACH and HMGEAR protocols. The results show that the accuracy of GRU is 97%, LSTM is 96%, CNN is 92% and ANN is 90%. Throughput, delay and the death of the first node are computed for LEACH, LEACH with DL, LEACH with RMCV, HMGEAR, HMGEAR with DL and HMGEAR with RMCV. Moreover, Oyente is used to perform the formal security analysis of the designed smart contract. The analysis shows that blockchain network is resilient against vulnerabilities.
引用
收藏
页码:31036 / 31051
页数:16
相关论文
共 50 条
  • [21] Learning-Based Routing Policy for Wireless Sensor Networks
    Halloum, Najim
    Darmani, Yousef
    Ahmadi, Ali
    Iranian Conference on Electrical Engineering, ICEE, 2024, (2024):
  • [22] BBAP-WSN: A New Blockchain-Based Authentication Protocol for Wireless Sensor Networks
    Dener, Murat
    Orman, Abdullah
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [23] Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach
    And, Ibrahim A. Abd El-Moghith
    Darwish, Saad M.
    IEEE ACCESS, 2021, 9 : 103822 - 103834
  • [24] Pattern Based Routing for Event Driven Wireless Sensor Actor Networks
    Vasanthi, N. A.
    Annadurai, S.
    PROCEEDINGS OF THE FIRST AMRITA ACM-W CELEBRATION OF WOMEN IN COMPUTING IN INDIA (A2WIC), 2010,
  • [25] Deep-Learning-Driven Secure Offline Blockchain in a Cyber-Physical Social System
    Xing, Rui
    Su, Zhou
    Luan, Tom. H.
    Li, Ruidong
    IEEE NETWORK, 2022, 36 (06): : 221 - 228
  • [26] Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning
    Gebremariam G.G.
    Panda J.
    Indu S.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [27] An Energy Driven Architecture for Wireless Sensor Networks
    Hoang, Doan B.
    Kamyabpour, Najmeh
    2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012), 2012, : 10 - 15
  • [28] Secure Communication and Routing Architecture in Wireless Sensor Networks
    Khan, Fazlullah
    2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2014, : 647 - 650
  • [29] Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks
    Awan, Saba
    Sajid, Maimoona Bint E.
    Amjad, Sana
    Aziz, Usman
    Gurmani, Usman
    Javaid, Nadeem
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS 2021, 2022, 279 : 96 - 107
  • [30] An Optimal Geographic Routing Protocol based on Honeycomb Architecture in Wireless Sensor Networks
    Soni, Vaibhav
    Mallick, Dheeresh K.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 4440 - 4444