Cargando…

A Secure LEACH-PRO Protocol Based on Blockchain

Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significa...

Descripción completa

Detalles Bibliográficos
Autores principales: Aljumaie, Ghada Sultan, Alhakami, Wajdi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9656685/
https://www.ncbi.nlm.nih.gov/pubmed/36366132
http://dx.doi.org/10.3390/s22218431
_version_ 1784829498077741056
author Aljumaie, Ghada Sultan
Alhakami, Wajdi
author_facet Aljumaie, Ghada Sultan
Alhakami, Wajdi
author_sort Aljumaie, Ghada Sultan
collection PubMed
description Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significantly fulfill the required protection, security enhancement with less energy consumption is essential to preserve the availability of resources and secure better performance. In 2020, Youssef et al. suggested a scheme called Enhanced Probabilistic Cluster Head Selection (LEACH-PRO) to extend the sensors’ lifetime in WSNs. This paper introduces a new variant of the LEACH-PRO protocol by adopting the blockchain security technique to protect WSNs. The proposed protocol (SLEACH-PRO) performs a decentralized authentication mechanism by applying a blockchain to multiple base stations to avoid system and performance degradation in the event of a station failure. The security analysis of the SLEACH-PRO is performed using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, the SLEACH-PRO is evaluated and compared to related protocols in terms of computational cost and security level based on its resistance against several attacks. The comparison results showed that the SLEACH-PRO protocol is more secure and requires less computational cost compared to other related protocols.
format Online
Article
Text
id pubmed-9656685
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96566852022-11-15 A Secure LEACH-PRO Protocol Based on Blockchain Aljumaie, Ghada Sultan Alhakami, Wajdi Sensors (Basel) Article Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significantly fulfill the required protection, security enhancement with less energy consumption is essential to preserve the availability of resources and secure better performance. In 2020, Youssef et al. suggested a scheme called Enhanced Probabilistic Cluster Head Selection (LEACH-PRO) to extend the sensors’ lifetime in WSNs. This paper introduces a new variant of the LEACH-PRO protocol by adopting the blockchain security technique to protect WSNs. The proposed protocol (SLEACH-PRO) performs a decentralized authentication mechanism by applying a blockchain to multiple base stations to avoid system and performance degradation in the event of a station failure. The security analysis of the SLEACH-PRO is performed using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, the SLEACH-PRO is evaluated and compared to related protocols in terms of computational cost and security level based on its resistance against several attacks. The comparison results showed that the SLEACH-PRO protocol is more secure and requires less computational cost compared to other related protocols. MDPI 2022-11-02 /pmc/articles/PMC9656685/ /pubmed/36366132 http://dx.doi.org/10.3390/s22218431 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Aljumaie, Ghada Sultan
Alhakami, Wajdi
A Secure LEACH-PRO Protocol Based on Blockchain
title A Secure LEACH-PRO Protocol Based on Blockchain
title_full A Secure LEACH-PRO Protocol Based on Blockchain
title_fullStr A Secure LEACH-PRO Protocol Based on Blockchain
title_full_unstemmed A Secure LEACH-PRO Protocol Based on Blockchain
title_short A Secure LEACH-PRO Protocol Based on Blockchain
title_sort secure leach-pro protocol based on blockchain
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9656685/
https://www.ncbi.nlm.nih.gov/pubmed/36366132
http://dx.doi.org/10.3390/s22218431
work_keys_str_mv AT aljumaieghadasultan asecureleachproprotocolbasedonblockchain
AT alhakamiwajdi asecureleachproprotocolbasedonblockchain
AT aljumaieghadasultan secureleachproprotocolbasedonblockchain
AT alhakamiwajdi secureleachproprotocolbasedonblockchain