2022
DOI: 10.3390/s22051972
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things

Abstract: This paper proposes a blockchain-based node authentication model for the Internet of sensor things (IoST). The nodes in the network are authenticated based on their credentials to make the network free from malicious nodes. In IoST, sensor nodes gather the information from the environment and send it to the cluster heads (CHs) for additional processing. CHs aggregate the sensed information. Therefore, their energy rapidly depletes due to extra workload. To solve this issue, we proposed distance, degree, and re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 50 publications
0
8
0
Order By: Relevance
“…By identification of the values of such variables, the value of trusted data forwarding support (TDFS) can be measured. Amjad et al [14] modelled distance, degrees, and remaining energy-related low-energy adaptive clustering hierarchy (DDR-LEACH) protocols. DDR-LEACH can be employed for replacing CHs with the ordinary node depending on maximal RE, degree, and minimal distance from BS.…”
Section: Related Workmentioning
confidence: 99%
“…By identification of the values of such variables, the value of trusted data forwarding support (TDFS) can be measured. Amjad et al [14] modelled distance, degrees, and remaining energy-related low-energy adaptive clustering hierarchy (DDR-LEACH) protocols. DDR-LEACH can be employed for replacing CHs with the ordinary node depending on maximal RE, degree, and minimal distance from BS.…”
Section: Related Workmentioning
confidence: 99%
“…In blockchain, each miner has plenty of computing resources, which could be used for AI training, and smart contract services of blockchain will diminish the overall costs of smart applications. AI and blockchain have the potential for dynamic resource management and mobility management in the 6G network; see, e.g., Amjad et al (2022).…”
Section: Special Issue Informationmentioning
confidence: 99%
“…The proliferation of wireless sensor networks (WSNs) has enabled the collection of data from various sources, which can be analyzed to derive useful insights. However, data transfer in WSNs is often unreliable due to factors such as interference, signal attenuation, and limited bandwidth [1,2]. Moreover, WSNs are prone to security threats such as node tampering, eavesdropping, and message replay attacks.…”
Section: Introductionmentioning
confidence: 99%