Blockchain-Enabled Secure Data Aggregation Routing (BSDAR) Protocol for IoT-Integrated Next-Generation Sensor Networks for Enhanced Security
DOI:
https://doi.org/10.22399/ijcesen.722Keywords:
Blockchain Technology, Secure Data Aggregation, Routing Protocols, IoT Networks, Energy Efficiency and Big Data, Analytic Hierarchy ProcessAbstract
WSNs, due to their special characteristics as compared to conventional networks, have become the focus of extensive research. A large-scale IoT forms the backbone of billions of resource-constrained next-generation sensors interconnected with each other. Their large-scale deployments remain one of the most serious challenges to existing security mechanisms due to the dynamic characteristics of IoT devices, which could not provide efficient protection against malicious adversaries. Besides, conventional routing protocols are vulnerable to various security threats from the unreliability and open-access nature of the internet. This research article presents a novel blockchain-enabled secure data aggregation model protocol for routing in IoT-integrated next-generation networks using sensor nodes. The BSDAR protocol is capable of improving energy routing performance while ensuring strong node-level data shield against malicious attacks. It first organizes the networking nodal points into autonomous clusters of different radii to effectively avoid energy holes around the BS. Then, the protocol uses the A-star based heuristics strategy to construct well-organized and non-looping routing paths. The BSDAR protocol has integrated blockchain technology with the goal of ensuring the security of the data communication process. In that, end-to-end communication is preserved by a decentralized and tamper-proof approach against malicious nodes. The simulation results prove that BSDAR significantly outperforms existing solutions in energy consumption, throughput, network lifetime and time complexity, thus presenting a promising solution for secure and scalable IoT deployments.
References
Chithaluru, P., Al-Turjman, F., Dugyala, R., Stephan, T., Kumar, M., & Dhatterwal, J. S. (2024). An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation. Future Generation Computer Systems. 152: 239-253. DOI:10.1016/j.future.2023.10.020
Bojič Burgos, J., & Pustišek, M. (2024). Decentralized IoT Data Authentication with Signature Aggregation. Sensors. 24(3): 1037. DOI:10.3390/s24031037
Bobde, Y., Narayanan, G., Jati, M., Raj, R. S. P., Cvitić, I., & Peraković, D. (2024). Enhancing Industrial IoT Network Security through Blockchain Integration. Electronics. 13(4): 687. DOI:10.3390/electronics13040687
Kulurkar, P., kumar Dixit, C., Bharathi, V. C., Monikavishnuvarthini, A., Dhakne, A., & Preethi, P. (2023). AI based elderly fall prediction system using wearable sensors: A smart home-care technology with IOT. Measurement: Sensors. 25: 100614. DOI:10.1016/j.measen.2022.100614
Preethi, P., & Asokan, R. (2020, December). Neural network oriented roni prediction for embedding process with hex code encryption in dicom images. In Proceedings of the 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India. 18-19. DOI:10.1109/ICACCCN51052.2020.9362880
Asokan, R., & Preethi, P. (2021). Deep learning with conceptual view in meta data for content categorization. In Deep Learning Applications and Intelligent Decision Making in Engineering. 176-191. IGI global. DOI:10.4018/978-1-7998-2108-3.ch007
Palanisamy, P., Padmanabhan, A., Ramasamy, A., & Subramaniam, S. (2023). Remote patient activity monitoring system by integrating IoT sensors and artificial intelligence techniques. Sensors. 23(13): 5869. DOI: 10.3390/s23135869
Bai, D. P., & Preethi, P. (2016). Security enhancement of health information exchange based on cloud computing system. International Journal of Scientific Engineering and Research. 4(10): 79-82.
Preethi, P., Asokan, R., Thillaiarasu, N., & Saravanan, T. (2021). An effective digit recognition model using enhanced convolutional neural network based chaotic grey wolf optimization. Journal of Intelligent & Fuzzy Systems. 41(2): 3727-3737. DOI:10.3233/JIFS-211242
Akila, V.; Sheela, T. (2017, May 13). Preserving data and key privacy in Data Aggregation forWireless Sensor Networks. In Proceedings of the 2017 2nd International Conference on Computing and Communications Technologies (ICT), Chennai, India. 282–287. DOI:10.1109/ICCCT2.2017.7972286
Akila, V.; Sheela, T. (2019, February 21-22). Secure Data Aggregation to Preserve Data and Key Privacy in Wireless Sensor Networks with Multiple Sinks. In Proceedings of the 2019 3rd International Conference on Computing and Communications Technologies (ICT), Chennai, India. 86–93. DOI:10.1109/iccct2.2019.8824992
C, V.; Premi, G.; Solainayagi, P.; Srinivasan, C.; Kuppusamy, P. (2023, August 18-19). Data Privacy and Confidentiality in Healthcare Applications of IoT-Enabled Wireless Sensor Networks. In Proceedings of the 2023 Second International Conference on Smart Technologies for Smart Nation (SmartTechCon), Singapore, Singapore. 610–614. DOI:10.1109/SmartTechCon57526.2023.10391743
Elmahdi, E.; Yoo, S.-M.; Sharshembiev, K.; Kim, Y.-K.; Jeong, G.-H. (2019, July 14-17). Protecting Data Integrity for Multi-Application Environment inWireless Sensor Networks. In Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA. 90–95. DOI:10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00037
Ruan, M.; Gao, H.;Wang, Y. (2019). Secure and Privacy-Preserving Consensus. IEEE Trans. Autom. Control. 64(10): 4035–4049.
DOI: 10.1109/TAC.2019.2890887
Zhou, Q.; Qin, X.; Liu, G.; Cheng, H.; Zhao, H. (2019, August 9-11). An Efficient Privacy and Integrity Preserving Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks. In Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), Tianjin, China. 291–297. DOI: 10.1109/SmartIoT.2019.00051
Phakade, S.V.; Singla, C.R.; Rajankar, O. (2022, August 26-28). Design of Privacy and Energy-Efficient DATA Aggregators for Wireless Sensor Networks. In Proceedings of the 2022 2nd Asian Conference on Innovation in Technology (ASIANCON), Ravet, India. 1–5. DOI:10.1109/ASIANCON55314.2022.9909044
Hu, S.; Liu, L.; Fang, L.; Zhou, F.; Ye, R. (2020). A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs. IEEE Access. 8: 802–813. DOI: 10.1109/ACCESS.2019.2961512
Shi, E.; Chan, H.T.H.; Rieffel, E.; Chow, R.; Song, D. (2011). Privacy-preserving aggregation of time-series data. In Annual Network & Distributed System Security Symposium (NDSS); Internet Society: Reston, VA, USA.
Boubiche, D.E.; Boubiche, S.; Toral-Cruz, H.; Pathan, A.-S.K.; Bilami, A.; Athmani, S. (2015). SDAW: Secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommun. Syst. 59(2). DOI:10.1007/s11235-015-0047-0
Shim, K.-A.; Park, C.-M. (2014). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(8): 1-1. DOI:10.1109/TPDS.2014.2346764
TAKAOĞLU, M., ÖZYAVAŞ, A., AJLOUNİ, N., DURSUN, T., TAKAOĞLU, F., & DEMİR, S. (2023). OTA 2.0: An Advanced and Secure Blockchain Steganography Algorithm . International Journal of Computational and Experimental Science and Engineering, 9(4), 419–434. Retrieved from https://ijcesen.com/index.php/ijcesen/article/view/289
M. Husain Bathushaw, & S. Nagasundaram. (2024). The Role of Blockchain and AI in Fortifying Cybersecurity for Healthcare Systems. International Journal of Computational and Experimental Science and Engineering, 10(4);1120-1129. https://doi.org/10.22399/ijcesen.596
V. Ananthakrishna, & Chandra Shekhar Yadav. (2025). QP-ChainSZKP: A Quantum-Proof Blockchain Framework for Scalable and Secure Cloud Applications. International Journal of Computational and Experimental Science and Engineering, 11(1);162-180. https://doi.org/10.22399/ijcesen.718
Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4);1041-1049. https://doi.org/10.22399/ijcesen.417
P., V., & A., M. R. (2024). A Scalable, Secure, and Efficient Framework for Sharing Electronic Health Records Using Permissioned Blockchain Technology. International Journal of Computational and Experimental Science and Engineering, 10(4);827-834. https://doi.org/10.22399/ijcesen.535
Prasada, P., & Prasad, D. S. (2024). Blockchain-Enhanced Machine Learning for Robust Detection of APT Injection Attacks in the Cyber-Physical Systems. International Journal of Computational and Experimental Science and Engineering, 10(4);799-810. https://doi.org/10.22399/ijcesen.539
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering
This work is licensed under a Creative Commons Attribution 4.0 International License.