{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:05:10Z","timestamp":1745946310982,"version":"3.37.3"},"reference-count":33,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006261","name":"Taif University","doi-asserted-by":"publisher","award":["TURSP-2020\/107"],"id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significantly fulfill the required protection, security enhancement with less energy consumption is essential to preserve the availability of resources and secure better performance. In 2020, Youssef et al. suggested a scheme called Enhanced Probabilistic Cluster Head Selection (LEACH-PRO) to extend the sensors\u2019 lifetime in WSNs. This paper introduces a new variant of the LEACH-PRO protocol by adopting the blockchain security technique to protect WSNs. The proposed protocol (SLEACH-PRO) performs a decentralized authentication mechanism by applying a blockchain to multiple base stations to avoid system and performance degradation in the event of a station failure. The security analysis of the SLEACH-PRO is performed using Burrows\u2013Abadi\u2013Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, the SLEACH-PRO is evaluated and compared to related protocols in terms of computational cost and security level based on its resistance against several attacks. The comparison results showed that the SLEACH-PRO protocol is more secure and requires less computational cost compared to other related protocols.<\/jats:p>","DOI":"10.3390\/s22218431","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T07:53:07Z","timestamp":1667461987000},"page":"8431","source":"Crossref","is-referenced-by-count":7,"title":["A Secure LEACH-PRO Protocol Based on Blockchain"],"prefix":"10.3390","volume":"22","author":[{"given":"Ghada Sultan","family":"Aljumaie","sequence":"first","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1230-9470","authenticated-orcid":false,"given":"Wajdi","family":"Alhakami","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Kocakulak, M., and Butun, I. (2017, January 9\u201311). An overview of Wireless Sensor Networks towards internet of things. Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2017.7868374"},{"key":"ref_2","first-page":"269","article-title":"Prosperity, vulnerabilities and security threats in WSN","volume":"3","author":"Chaudhary","year":"2012","journal-title":"Int. J. Adv. Res. Comp. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Simon, G., Mar\u00f3ti, M., L\u00e9deczi, \u00c1., Balogh, G., Kusy, B., N\u00e1das, A., Pap, G., Sallai, J., and Frampton, K. (2004, January 3\u20135). Sensor network-based countersniper system. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA.","DOI":"10.1145\/1031495.1031497"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Yick, J., Mukherjee, B., and Ghosal, D. (2005, January 7). Analysis of a prediction-based mobility adaptive tracking algorithm. Proceedings of the 2nd International Conference on Broadband Networks, Boston, MA, USA.","DOI":"10.1109\/ICBN.2005.1589681"},{"key":"ref_5","first-page":"259","article-title":"Self-organization of a heterogeneous sensor network by genetic algorithms","volume":"8","author":"Buczak","year":"1998","journal-title":"Intell. Eng. Syst. Through Artif. Neural Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/49.622910","article-title":"Adaptive clustering for mobile wireless networks","volume":"15","author":"Lin","year":"1997","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_7","unstructured":"Heinzelman, W.R., Chandrakasan, A., and Balakrishnan, H. (2000, January 4\u20137). Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yousif, Z., Hussain, I., Djahel, S., and Hadjadj-Aoul, Y. (2021). A Novel Energy-Efficient Clustering Algorithm for More Sustainable Wireless Sensor Networks Enabled Smart Cities Applications. J. Sens. Actuator Netw., 10.","DOI":"10.3390\/jsan10030050"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MS.2017.4121227","article-title":"Adaptable Blockchain-Based Systems: A Case Study for Product Traceability","volume":"34","author":"Lu","year":"2017","journal-title":"IEEE Softw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"12295","DOI":"10.1109\/ACCESS.2018.2799205","article-title":"Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems","volume":"6","author":"Zhao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"72326","DOI":"10.1109\/ACCESS.2021.3079708","article-title":"Employing Blockchain Technology to Strengthen Security of Wireless Sensor Networks","volume":"9","author":"Hsiao","year":"2021","journal-title":"IEEE Access"},{"key":"ref_12","first-page":"300","article-title":"Real Time Two Hop Neighbour Strategic Secure Routing with Attribute Specific Blockchain Encryption Scheme for Improved Security in Wireless Sensor Networks","volume":"8","author":"Kumar","year":"2021","journal-title":"Int. J. Comput. Netw. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Aziz, U., Gurmani, M.U., Awan, S., Sajid, M.B.E., Amjad, S., and Javaid, N. (2021, January 1\u20133). A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks. Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, Asan, Korea.","DOI":"10.1007\/978-3-030-79728-7_10"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yang, J., He, S., Xu, Y., Chen, L., and Ren, J. (2019). A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks. Sensors, 19.","DOI":"10.3390\/s19040970"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"103822","DOI":"10.1109\/ACCESS.2021.3098933","article-title":"Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach","volume":"9","author":"Darwish","year":"2021","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Jerbi, W., Cheikhrouhou, O., Guermazi, A., Boubaker, A., and Trabelsi, H. (2021, January 7\u201310). A Novel Blockchain Secure to Routing Protocol in WSN. Proceedings of the IEEE 22nd International Conference on High Performance Switching and Routing (HPSR), Paris, France.","DOI":"10.1109\/HPSR52026.2021.9481805"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Awan, S., Sajid, M.B.E., Amjad, S., Aziz, U., Gurmani, U., and Javaid, N. (2022, January 1\u20133). Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks. Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, Asan, Korea.","DOI":"10.1007\/978-3-030-79728-7_11"},{"key":"ref_18","first-page":"241","article-title":"A Hybrid Blockchain-Based Identity Authentication Scheme for Multi-WSN","volume":"13","author":"Cui","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_19","first-page":"233","article-title":"A logic of authentication","volume":"426","author":"Burrows","year":"1989","journal-title":"Proc. R. Soc. A Math. Phys. Eng. Sci."},{"key":"ref_20","unstructured":"AVISPA (2020, December 04). Automated Validation of Internet Security Protocols and Applications. Available online: http:\/\/www.avispa-project.org."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","article-title":"Automated security protocol analysis with the AVISPA tool","volume":"155","author":"Vigano","year":"2006","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s11277-014-2115-2","article-title":"A Secure and Efficient Authentication Protocol in Wireless Sensor Network","volume":"81","author":"Chatterjee","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.3844\/jcssp.2018.1401.1411","article-title":"TPAL: A Protocol for Node Authentication in IoT","volume":"14","author":"Razali","year":"2018","journal-title":"J. Comput. Sci."},{"key":"ref_24","first-page":"67","article-title":"Elliptic Curve Cryptography based Secure Image Transmission in Clustered Wireless Sensor Networks","volume":"8","author":"Gupta","year":"2021","journal-title":"Int. J. Comput. Netw. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1547963","DOI":"10.1155\/2016\/1547963","article-title":"A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks","volume":"2016","author":"Qin","year":"2016","journal-title":"J. Sens."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lu, Y., Li, L., Peng, H., and Yang, Y. (2016). An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks. Sensors, 16.","DOI":"10.3390\/s16060837"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","article-title":"An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment","volume":"36","author":"Farash","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., and Ylianttila, M. (2014, January 6\u20139). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey.","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.comnet.2016.05.007","article-title":"Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines","volume":"104","author":"Kumari","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1002\/sec.517","article-title":"Two-factor mutual authentication with key agreement in wireless sensor networks","volume":"9","author":"Vaidya","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_31","first-page":"255","article-title":"A lightweight biometrics based remote user authentication scheme for IoT services","volume":"34","author":"Dhillon","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"e4218","DOI":"10.1002\/ett.4218","article-title":"An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network","volume":"32","author":"Rangwani","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","article-title":"A Survey of SIP Authentication and Key Agreement Schemes","volume":"16","author":"Kilinc","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/21\/8431\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T21:55:58Z","timestamp":1723154158000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/21\/8431"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,2]]},"references-count":33,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["s22218431"],"URL":"https:\/\/doi.org\/10.3390\/s22218431","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,11,2]]}}}