Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things
by
Alsharif, Mohammed H.
, Amjad, Sana
, Javaid, Nadeem
, Jahid, Abu
, Abbas, Shahid
, Abubaker, Zain
in
Algorithms
/ authentication
/ Blockchain
/ Cluster Analysis
/ clustering
/ Computer Communication Networks
/ Digital signatures
/ Internet
/ LEACH protocol
/ malicious node detection
/ Privacy
/ Sensors
/ service provisioning
/ Third party
/ Wireless networks
/ Wireless Technology
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things
by
Alsharif, Mohammed H.
, Amjad, Sana
, Javaid, Nadeem
, Jahid, Abu
, Abbas, Shahid
, Abubaker, Zain
in
Algorithms
/ authentication
/ Blockchain
/ Cluster Analysis
/ clustering
/ Computer Communication Networks
/ Digital signatures
/ Internet
/ LEACH protocol
/ malicious node detection
/ Privacy
/ Sensors
/ service provisioning
/ Third party
/ Wireless networks
/ Wireless Technology
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things
by
Alsharif, Mohammed H.
, Amjad, Sana
, Javaid, Nadeem
, Jahid, Abu
, Abbas, Shahid
, Abubaker, Zain
in
Algorithms
/ authentication
/ Blockchain
/ Cluster Analysis
/ clustering
/ Computer Communication Networks
/ Digital signatures
/ Internet
/ LEACH protocol
/ malicious node detection
/ Privacy
/ Sensors
/ service provisioning
/ Third party
/ Wireless networks
/ Wireless Technology
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things
Journal Article
Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things
2022
Request Book From Autostore
and Choose the Collection Method
Overview
This paper proposes a blockchain-based node authentication model for the Internet of sensor things (IoST). The nodes in the network are authenticated based on their credentials to make the network free from malicious nodes. In IoST, sensor nodes gather the information from the environment and send it to the cluster heads (CHs) for additional processing. CHs aggregate the sensed information. Therefore, their energy rapidly depletes due to extra workload. To solve this issue, we proposed distance, degree, and residual energy-based low-energy adaptive clustering hierarchy (DDR-LEACH) protocol. DDR-LEACH is used to replace CHs with the ordinary nodes based on maximum residual energy, degree, and minimum distance from BS. Furthermore, storing a huge amount of data in the blockchain is very costly. To tackle this issue, an external data storage, named as interplanetary file system (IPFS), is used. Furthermore, for ensuring data security in IPFS, AES 128-bit is used, which performs better than the existing encryption schemes. Moreover, a huge computational cost is required using a proof of work consensus mechanism to validate transactions. To solve this issue, proof of authority (PoA) consensus mechanism is used in the proposed model. The simulation results are carried out, which show the efficiency and effectiveness of the proposed system model. The DDR-LEACH is compared with LEACH and the simulation results show that DDR-LEACH outperforms LEACH in terms of energy consumption, throughput, and improvement in network lifetime with CH selection mechanism. Moreover, transaction cost is computed, which is reduced by PoA during data storage on IPFS and service provisioning. Furthermore, the time is calculated in the comparison of AES 128-bit scheme with existing scheme. The formal security analysis is performed to check the effectiveness of smart contract against attacks. Additionally, two different attacks, MITM and Sybil, are induced in our system to show our system model’s resilience against cyber attacks.
Publisher
MDPI AG,MDPI
This website uses cookies to ensure you get the best experience on our website.