Cargando…
A Secure LEACH-PRO Protocol Based on Blockchain
Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significa...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9656685/ https://www.ncbi.nlm.nih.gov/pubmed/36366132 http://dx.doi.org/10.3390/s22218431 |
_version_ | 1784829498077741056 |
---|---|
author | Aljumaie, Ghada Sultan Alhakami, Wajdi |
author_facet | Aljumaie, Ghada Sultan Alhakami, Wajdi |
author_sort | Aljumaie, Ghada Sultan |
collection | PubMed |
description | Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significantly fulfill the required protection, security enhancement with less energy consumption is essential to preserve the availability of resources and secure better performance. In 2020, Youssef et al. suggested a scheme called Enhanced Probabilistic Cluster Head Selection (LEACH-PRO) to extend the sensors’ lifetime in WSNs. This paper introduces a new variant of the LEACH-PRO protocol by adopting the blockchain security technique to protect WSNs. The proposed protocol (SLEACH-PRO) performs a decentralized authentication mechanism by applying a blockchain to multiple base stations to avoid system and performance degradation in the event of a station failure. The security analysis of the SLEACH-PRO is performed using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, the SLEACH-PRO is evaluated and compared to related protocols in terms of computational cost and security level based on its resistance against several attacks. The comparison results showed that the SLEACH-PRO protocol is more secure and requires less computational cost compared to other related protocols. |
format | Online Article Text |
id | pubmed-9656685 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96566852022-11-15 A Secure LEACH-PRO Protocol Based on Blockchain Aljumaie, Ghada Sultan Alhakami, Wajdi Sensors (Basel) Article Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significantly fulfill the required protection, security enhancement with less energy consumption is essential to preserve the availability of resources and secure better performance. In 2020, Youssef et al. suggested a scheme called Enhanced Probabilistic Cluster Head Selection (LEACH-PRO) to extend the sensors’ lifetime in WSNs. This paper introduces a new variant of the LEACH-PRO protocol by adopting the blockchain security technique to protect WSNs. The proposed protocol (SLEACH-PRO) performs a decentralized authentication mechanism by applying a blockchain to multiple base stations to avoid system and performance degradation in the event of a station failure. The security analysis of the SLEACH-PRO is performed using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, the SLEACH-PRO is evaluated and compared to related protocols in terms of computational cost and security level based on its resistance against several attacks. The comparison results showed that the SLEACH-PRO protocol is more secure and requires less computational cost compared to other related protocols. MDPI 2022-11-02 /pmc/articles/PMC9656685/ /pubmed/36366132 http://dx.doi.org/10.3390/s22218431 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Aljumaie, Ghada Sultan Alhakami, Wajdi A Secure LEACH-PRO Protocol Based on Blockchain |
title | A Secure LEACH-PRO Protocol Based on Blockchain |
title_full | A Secure LEACH-PRO Protocol Based on Blockchain |
title_fullStr | A Secure LEACH-PRO Protocol Based on Blockchain |
title_full_unstemmed | A Secure LEACH-PRO Protocol Based on Blockchain |
title_short | A Secure LEACH-PRO Protocol Based on Blockchain |
title_sort | secure leach-pro protocol based on blockchain |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9656685/ https://www.ncbi.nlm.nih.gov/pubmed/36366132 http://dx.doi.org/10.3390/s22218431 |
work_keys_str_mv | AT aljumaieghadasultan asecureleachproprotocolbasedonblockchain AT alhakamiwajdi asecureleachproprotocolbasedonblockchain AT aljumaieghadasultan secureleachproprotocolbasedonblockchain AT alhakamiwajdi secureleachproprotocolbasedonblockchain |