{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:41:09Z","timestamp":1725878469741},"reference-count":50,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"In this paper, an encryption and trust evaluation model is proposed on the basis of a blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) are stored. The authentication of ANs and SNs is performed in public and private blockchains, respectively. However, inauthentic nodes utilize the network\u2019s resources and perform malicious activities. Moreover, the SNs have limited energy, transmission range and computational capabilities, and are attacked by malicious nodes. Afterwards, the malicious nodes transmit wrong information of the route and increase the number of retransmissions due to which the SNs\u2019 energy is rapidly consumed. The lifespan of the wireless sensor network is reduced due to the rapid energy dissipation of the SNs. Furthermore, the throughput increases and packet loss increase with the presence of malicious nodes in the network. The trust values of SNs are computed to eradicate the malicious nodes from the network. Secure routing in the network is performed considering residual energy and trust values of the SNs. Moreover, the Rivest\u2013Shamir\u2013Adleman (RSA), a cryptosystem that provides asymmetric keys, is used for securing data transmission. The simulation results show the effectiveness of the proposed model in terms of high packet delivery ratio.<\/jats:p>","DOI":"10.3390\/s22020411","type":"journal-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T04:08:26Z","timestamp":1641787706000},"page":"411","source":"Crossref","is-referenced-by-count":38,"title":["Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks"],"prefix":"10.3390","volume":"22","author":[{"given":"Saba","family":"Awan","sequence":"first","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3777-8249","authenticated-orcid":false,"given":"Nadeem","family":"Javaid","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan"},{"name":"School of Computer Science, University of Technology Sydney, Ultimo, NSW 2007, Australia"}]},{"given":"Sameeh","family":"Ullah","sequence":"additional","affiliation":[{"name":"School of Information Technology, Illinois State University USA, Normal, IL 61761, USA"}]},{"given":"Asad Ullah","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5323-6661","authenticated-orcid":false,"given":"Ali Mustafa","family":"Qamar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer, Qassim University, Buraydah 52571, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7186-2156","authenticated-orcid":false,"given":"Jin-Ghoo","family":"Choi","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Kandris, D., Nakas, C., Vomvas, D., and Koulouras, G. (2020). Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov., 3.","DOI":"10.3390\/asi3010014"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/COMST.2017.2650979","article-title":"A survey of network lifetime maximization techniques in wireless sensor networks","volume":"19","author":"Yetgin","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/COMST.2017.2691551","article-title":"Structural health monitoring using wireless sensor networks: A comprehensive survey","volume":"19","author":"Noel","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wang, J., Gao, Y., Liu, W., Sangaiah, A.K., and Kim, H.J. (2019). Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors, 19.","DOI":"10.3390\/s19071494"},{"key":"ref_5","first-page":"1000","article-title":"Energy efficient resource allocation in wireless energy harvesting sensor networks","volume":"9","author":"Azarhava","year":"2020","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1007\/s00607-018-0690-x","article-title":"Efficient routing for corona based underwater wireless sensor networks","volume":"101","author":"Khan","year":"2019","journal-title":"Computing"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2177","DOI":"10.1109\/TIM.2018.2814082","article-title":"Monitoring of large-area IoT sensors using a LoRa wireless mesh network system: Design and evaluation","volume":"67","author":"Lee","year":"2018","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","article-title":"Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks","volume":"5","author":"Jiang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Shin, S., and Kwon, T. (2019). A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes. Sensors, 19.","DOI":"10.3390\/s19092012"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"184133","DOI":"10.1109\/ACCESS.2019.2960609","article-title":"A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks","volume":"7","author":"Kim","year":"2019","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Guerrero-Sanchez, A.E., Rivas-Araiza, E.A., Gonzalez-Cordoba, J.L., Toledano-Ayala, M., and Takacs, A. (2020). Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors, 20.","DOI":"10.3390\/s20102798"},{"key":"ref_12","first-page":"102998","article-title":"A consortium blockchain based energy trading scheme for Electric Vehicles in smart cities","volume":"63","author":"Khalid","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1109\/TEM.2019.2928280","article-title":"Evaluation and demonstration of blockchain applicability framework","volume":"67","author":"Gourisetti","year":"2019","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Samuel, O., and Javaid, N. (2021). GarliChain: A privacy preserving system for smart grid consumers using blockchain. Int. J. Energy Res., 1\u201317.","DOI":"10.1002\/er.7040"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"170404","DOI":"10.1109\/ACCESS.2020.3024254","article-title":"When blockchain meets sgx: An overview, challenges, and open issues","volume":"8","author":"Bao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"139739","DOI":"10.1109\/ACCESS.2021.3118948","article-title":"Securing Genetic Algorithm Enabled SDN Routing for Blockchain Based Internet of Things","volume":"9","author":"Abbas","year":"2021","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"17434","DOI":"10.1109\/ACCESS.2020.2966464","article-title":"Segment blockchain: A size reduced storage mechanism for blockchain","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_18","unstructured":"Moinet, A., Darties, B., and Baril, J.L. (2017). Blockchain based trust and authentication for decentralized sensor networks. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"38947","DOI":"10.1109\/ACCESS.2019.2902811","article-title":"Blockchain trust model for malicious node detection in wireless sensor networks","volume":"7","author":"She","year":"2019","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"6139","DOI":"10.1007\/s13369-020-04493-8","article-title":"Blockchain powered secure range-free localization in wireless sensor networks","volume":"45","author":"Goyat","year":"2020","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3293537","article-title":"Routing-aware and malicious node detection in a concealed data aggregation for WSNs","volume":"15","author":"Alghamdi","year":"2019","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_22","first-page":"47","article-title":"Selection of WSNs inter-cluster boundary nodes using PSO algorithm","volume":"34","author":"Yadav","year":"2019","journal-title":"J. Comput. Sci. Coll."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1798256","DOI":"10.1155\/2021\/1798256","article-title":"An Incentive and Reputation Mechanism Based on Blockchain for Crowd Sensing Network","volume":"2021","author":"Noshad","year":"2021","journal-title":"J. Sens."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1007\/s12083-019-00739-x","article-title":"P2P networking based internet of things (IoT) sensor node authentication by Blockchain","volume":"13","author":"Hong","year":"2020","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"6193","DOI":"10.1109\/TII.2020.2965975","article-title":"A blockchain-based secure key management scheme with trustworthiness in DWSNs","volume":"16","author":"Tian","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1007\/s12652-020-02017-8","article-title":"A secure IoT sensors communication in industry 4.0 using blockchain technology","volume":"12","author":"Rathee","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Kolumban-Antal, G., Lasak, V., Bogdan, R., and Groza, B. (2020). A secure and portable multi-sensor module for distributed air pollution monitoring. Sensors, 20.","DOI":"10.3390\/s20020403"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"185496","DOI":"10.1109\/ACCESS.2019.2960633","article-title":"Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things","volume":"7","author":"Haseeb","year":"2019","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"5287","DOI":"10.1007\/s12652-020-02007-w","article-title":"Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN","volume":"12","author":"Kumar","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"4029591","DOI":"10.1155\/2018\/4029591","article-title":"A blockchain-based contractual routing protocol for the internet of things using smart contracts","volume":"2018","author":"Ramezan","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yang, J., He, S., Xu, Y., Chen, L., and Ren, J. (2019). A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks. Sensors, 19.","DOI":"10.3390\/s19040970"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3571","DOI":"10.1109\/TII.2019.2904049","article-title":"LightChain: A lightweight blockchain system for industrial internet of things","volume":"15","author":"Liu","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Uddin, M.A., Stranieri, A., Gondal, I., and Balasurbramanian, V. (2019). A lightweight blockchain based framework for underwater iot. Electronics, 8.","DOI":"10.3390\/electronics8121552"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2354","DOI":"10.1109\/JIOT.2019.2906615","article-title":"Delay and communication tradeoffs for blockchain systems with lightweight IoT clients","volume":"6","author":"Danzi","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_35","first-page":"183","article-title":"Optimizing the age of information for blockchain technology with applications to IoT sensors","volume":"24","author":"Razi","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"108418","DOI":"10.1016\/j.comnet.2021.108418","article-title":"Optimization framework for best approver selection method (BASM) and best tip selection method (BTSM) for IOTA tangle network: Blockchain-enabled next generation industrial IoT","volume":"199","author":"Halgamuge","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"11008","DOI":"10.1109\/TVT.2018.2866365","article-title":"Computation offloading and content caching in wireless blockchain networks with mobile edge computing","volume":"67","author":"Liu","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_38","first-page":"6874158","article-title":"Incentive mechanism of data storage based on blockchain for wireless sensor networks","volume":"2018","author":"Ren","year":"2018","journal-title":"Mob. Inf. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Kushch, S., and Prieto-Castrillo, F. (2019, January 15\u201318). Blockchain for dynamic nodes in a smart city. Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland.","DOI":"10.1109\/WF-IoT.2019.8767336"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1016\/j.future.2018.04.060","article-title":"Blockchain based hybrid network architecture for the smart city","volume":"86","author":"Sharma","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.jnca.2019.06.019","article-title":"BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network","volume":"143","author":"Rathore","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"3632","DOI":"10.1109\/TII.2019.2897133","article-title":"A blockchain-based nonrepudiation network computing service scheme for industrial IoT","volume":"15","author":"Xu","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Cinque, M., Cotroneo, D., Di Martino, C., Russo, S., and Testa, A. (2009, January 23\u201329). Avr-inject: A tool for injecting faults in wireless sensor nodes. Proceedings of the 2009 IEEE International Symposium on Parallel and Distributed Processing, Rome, Italy.","DOI":"10.1109\/IPDPS.2009.5160907"},{"key":"ref_44","first-page":"241","article-title":"A hybrid blockchain-based identity authentication scheme for multi-WSN","volume":"13","author":"Cui","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Awan, S., Sajid, M.B., Amjad, S., Aziz, U., Gurmani, M.U., and Javaid, N. (2021, January 1\u20133). Blockchain based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks. Proceedings of the 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Asan, Korea.","DOI":"10.1007\/978-3-030-79728-7_11"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/TEM.2019.2953889","article-title":"Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks","volume":"68","author":"Rathee","year":"2019","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1637","DOI":"10.1007\/s11277-019-06788-y","article-title":"QoS aware trust based routing algorithm for wireless sensor networks","volume":"110","author":"Kalidoss","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"143539","DOI":"10.1109\/ACCESS.2019.2944648","article-title":"Adaptive trust-based routing protocol for large scale WSNs","volume":"7","author":"Khalid","year":"2019","journal-title":"IEEE Access"},{"key":"ref_49","unstructured":"Praitheeshan, P., Pan, L., Yu, J., Liu, J., and Doss, R. (2019). Security analysis methods on ethereum smart contract vulnerabilities: A survey. arXiv."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"7000","DOI":"10.1109\/ACCESS.2020.3048169","article-title":"Blockchain Based Data and Energy Trading in Internet of Electric Vehicles","volume":"9","author":"Sadiq","year":"2020","journal-title":"IEEE Access"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/2\/411\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T04:10:52Z","timestamp":1721794252000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/2\/411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,6]]},"references-count":50,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["s22020411"],"URL":"https:\/\/doi.org\/10.3390\/s22020411","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,6]]}}}