4.6 Article

BBAP-WSN: A New Blockchain-Based Authentication Protocol for Wireless Sensor Networks

Journal

APPLIED SCIENCES-BASEL
Volume 13, Issue 3, Pages -

Publisher

MDPI
DOI: 10.3390/app13031526

Keywords

blockchain; authentication; security; wireless sensor networks; WSN

Ask authors/readers for more resources

Wireless Sensor Networks (WSNs), as an important part of IoT, consist of sensor nodes with limited processing, memory capacities, and energy. The security of WSNs is often questioned due to the dangers they face in untrusted regions. This study aims to develop a new blockchain-based authentication protocol for WSNs to address the deficiencies in existing authentication protocols and utilize the security characteristics of blockchain.
Wireless Sensor Networks-WSNs, an important part of IoT-consist of sensor nodes with limited processing, memory capacities, and energy. Wireless Sensor Networks face many dangers as they are often distributed into untrusted regions. The accuracy of the data obtained in a WSN, where security threats cannot be prevented, is also questioned. In WSNs, the authentication of the resources and the data can be verified with the authentication mechanism. Authentication in WSNs allows the node to verify whether data have been sent from authorized sources and protects the original data from changes. However, there are some deficiencies in terms of security in existing authentication protocols such as ID spoofing attacks. In addition, blockchain, one of the emerging technologies, gives significant successful results in security applications. Cryptographically secured, immutable, non-repudiable, irrevocable, auditable, and verifiable can be given as security-related characteristics of the blockchain. This study aims to use these features of the blockchain in WSNs. In this study, a new blockchain-based authentication protocol was developed for WSNs. Based on the study's system model, sensor nodes, cluster nodes, base station, and blockchain networks were created using a private blockchain, and users. A detailed security analysis was carried out for the study. At the same time, efficiency analysis was performed by implementing the proposed model on the WiSeN sensor node.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available