Affiliation:
1. Department of Information Technology and Computer Engineering , University of Qom , Iran
Abstract
Abstract
The versatility of Wireless Sensor Networks (WSNs) and other unique qualities inspired by real-time collaboration between the sensor nodes make them widely used for a range of applications in monitoring and surveillance. As solutions for malicious node identification involve a single, centralized decision-making process, security in WSNs is becoming more and more important. Errors are difficult to prevent with this paradigm, and repeatability and traceability are problems. Therefore, the detecting ability and integrity of the developed detection method cannot be guaranteed by malicious node identification technology in ordinary WSNs. This article provides insights into this innovative idea as well as a thorough investigation of the use of blockchain technology to WSNs (Blockchain-Based WSN), including a full analysis of a blockchain-based method for identifying rogue nodes. The Blockchain-Based WSN architecture, business-specific applications, and use are all included in this study. The Blockchain-Based WSN architecture model for tracking malicious nodes and the smart contract features of malicious node detection is both included in the explanation of harmful node identification based on Blockchain-Based WSN in this paper. The second part of this study investigates the use of blockchain technology to the management of WSN data, which necessitates online information aggregation and may also require auditing, event logging, and storage for information analysis and offline query processing. The traditional WSN data management approaches are discussed first in this study, followed by the blockchain-based WSN data management choices. The benefaction of blockchain to WSN security management is also included in this survey. Before discussing blockchain-based WSN security management solutions, such as those that provide access control, protect data integrity, ensure anonymity, and prolong the life of WSN nodes, it first looks at the security vulnerabilities of centralized WSN models.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Empirical Analysis of Developing EC Based Algorithms for Various WSN Network Applications;2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2024-05-14
2. An Integration of Satellite A Based Network With Higher Level Type Network with the use of P-P Connection: A Deep Review;2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2024-05-14