ArticlePDF Available

Blockchain Based Multi-hop Routing and Cost-Effective Decentralized Storage System for Wireless Sensor Networks

Authors:

Abstract and Figures

In Wireless Sensor Networks, nodes have resource constraints such as storage capacity, low energy, and computational power, etc. Due to which it directly affects the lifetime, security, and performance of WSN. Improved-Low energy adaptive clustering hierarchy (I- LEACH) is one of the most famous clustering protocols and is employed to maximize the lifetime of the WSN network. In this paper, a blockchain based multi-hop routing protocol and clustering in Wireless Sensor Networks (WSNs) have been proposed. In our proposed model, for cluster head (CH) selections, three parameters have been deployed for CH selection i.e., residual energy of the ordinary node (ON), distance of an ON from the base station (BS) and value of the packet delivery ratio (PDR). After selection of an ON as a CH, an Energy-Efficient Adhoc On-demand Distance Vector EEAODV based routing protocol is employed to send data from CH to the BS in an energy-efficient way. Cloud storage is used to store the credentials and other data. The simulation results show that our proposed I-LEACH protocol performs better than the benchmark ALEACH.
This content is subject to copyright. Terms and conditions apply.
Vol.:(0123456789)
Wireless Personal Communications
https://doi.org/10.1007/s11277-023-10597-9
1 3
Blockchain Based Multi‑hop Routing andCost‑Effective
Decentralized Storage System forWireless Sensor Networks
MuhammadFaisal1· GhassanHusnain1
Accepted: 28 June 2023
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023
Abstract
In Wireless Sensor Networks, nodes have resource constraints such as storage capacity,
low energy, and computational power, etc. Due to which it directly affects the lifetime,
security, and performance of WSN. Improved-Low energy adaptive clustering hierarchy (I-
LEACH) is one of the most famous clustering protocols and is employed to maximize the
lifetime of the WSN network. In this paper, a blockchain based multi-hop routing protocol
and clustering in Wireless Sensor Networks (WSNs) have been proposed. In our proposed
model, for cluster head (CH) selections, three parameters have been deployed for CH selec-
tion i.e., residual energy of the ordinary node (ON), distance of an ON from the base sta-
tion (BS) and value of the packet delivery ratio (PDR). After selection of an ON as a CH,
an Energy-Efficient Adhoc On-demand Distance Vector EEAODV based routing protocol
is employed to send data from CH to the BS in an energy-efficient way. Cloud storage is
used to store the credentials and other data. The simulation results show that our proposed
I-LEACH protocol performs better than the benchmark ALEACH.
Keywords Blockchain· Wireless Sensor Network· Improved LEACH· EEAODV· Cloud
Storage
1 Introduction
The wireless sensor network is one of the dominant technologies of today [1]. It is self-
organized with no infrastructure to control the physical environment. The main purpose
of the WSN is to collect information from the physical world. Usually, we deployed WSN
networks in those areas where it is difficult for the wired-base network to work efficiently.
The monetary cost of sensor nodes in WSN is very low, gives accurate results, and has
high performance. However. WSN sensors have limited energy, low transmission range,
and small size which forces the sensors to cooperate for the transfer of data. Also, WSNs
* Ghassan Husnain
ghusnain.mct@uetpeshawar.edu.pk
Muhammad Faisal
mfaisal5751@gmail.com
1 Department ofComputer Science, IQRA National University, Hayatabad,Peshawar25100,
Pakistan
M.Faisal, G.Husnain
1 3
are less secure as compared to wired networks. Battery life is very low, and it needs to be
charged after a specific amount of time. Due to its wireless infrastructure, it faces envi-
ronmental resistance, and as a result communication speed of the sensor nodes is slow as
compared to the wired network. However, there are some positive aspects of WSN too, like
it does not need any physical infrastructure as we deployed in wired base networks. WSN
has many Applications like it can be used for surveillance, weather forecast, health care,
agriculture, industries, [24], etc.
Blockchain technology became popular day by day. Unlike a centralized system, block-
chain technology did not depend on the central authority [5]. It is a distributed ledger tech-
nology that Keeps records of the transaction between two entities in a secure and immu-
table way. Once a transaction is stored in the blockchain. It is impossible to alter that
information because the information is stored not only on the central point. However, it
is distributed. If someone wants to change the information stored on the blockchain must
take permission from all the nodes on which a copy of that ledger is saved. Each block in
the blockchain consists of two things, one is the blocking header and the other is the block
body. Block header further consists of a nonce value, timestamp and difficulty target, etc.
The second part of the block is the block body which consists of a transaction record.
The main feature of blockchain technology that makes it more reliable is as follows,
motivated from [6].
1.1 Decentralization
As we know that in the traditional system, there was a central authority (CA) on which the
whole network depends. However, in a blockchain, there is no CA. The information stored
in the blockchain is distributed. No single entity can change it. Change in the information
can only be made when all the entities in the network agreed.
1.2 Transparency
The transactions done through blockchain are transparent and every entity of the block-
chain network could see the transaction and its related details.
1.3 Immutability
Blockchain technology uses cryptographic hash functions. By using this, it is impossible to
alter the information once it is stored on the chain.
1.4 Non‑Repudiation
It means that once the transaction is held and stored on the blockchain, then no one can
refuse the transaction. There are two aspects of non-repudiation. Suppose we have two
nodes A and B. A want to send some information to B. After sending the information, A
cannot deny his behavior. The other aspect is that B cannot claim that he did not receive the
information. As digital signatures are used in blockchain to guarantee the non-repudiation
of information.
Similarly, there are mainly three types of blockchain technology which are:
Blockchain Based Multi‑hop Routing andCost‑Effective…
1 3
1.5 Public Blockchain
It is the type of blockchain that is publicly available and anyone can join the network. All
the participants are capable to read and write or participate in the network. Once the data is
validated on the blockchain, no one can change it. This type of blockchain is considered to
be fully decentralized. Examples are Bitcoin and Ethereum.
1.6 Private Blockchain
It is also called consortium blockchain. It is not available publicly and only preselected
nodes are capable to control the consensus process. This type of blockchain is considered
partially decentralized. It is usually designed for private businesses.
1.7 Hybrid Blockchain
It is a combination of both public and private blockchain [7]. However, a private block-
chain has been proposed in this work.
Today, blockchain is used in many areas like Finance [8], Hospitality, Tourism [9],
Healthcare [10], etc. To make the transaction secure on the blockchain, it uses a one-way
encryption scheme called a hash function. There are different families of hash functions
like secure hash functions SHA, MD5, and Blake, etc. Besides this, blockchain has also
some disadvantages it required more computation power while adding a transaction to the
chain. Different consensus mechanisms are used for this purpose i.e., Proof of Work, Proof
of Authority, Proof of stack, etc. Similarly, the monetary cost of blockchain is very high.
As in a traditional system, the whole network relies on a central entity, due to which it
faces a central point of failure, needing high computational cost and trust issues. However,
when we are talking about blockchain-based WSNs, it makes our communication more
secure and reliable. Besides this WSN using blockchain also face some critical problems.
Like in WSN storage capacity and lifetime is very low. On the other hand, storing data on
the blockchain is very costly and it needs more computational power to add transactions.
An energy-efficient routing is also a need of WSN. Many researches have been done on
these issues. However, no one can get the appropriate result [11].
To resolve the above-mentioned issues, we proposed a multi-hop routing and a cost-
effective decentralized storage station, cluster head, and ordinary nodes. Blockchain layer,
composed of the private blockchain. And cloud layer, consist of Fog computing and Cloud
computing. After deploying nodes, we will choose the cluster head based on three parame-
ters i.e., residual energy, degree of a node, and distance from the base station. After choos-
ing the cluster head, a pseudonym name will be assigned to all the nodes for communi-
cation. A private Blockchain is used for transaction records. Fog computing is used as a
medium between the base station and cloud computing. It is also responsible to store data.
For routing, we will use a routing protocol capable to find the route from the source to the
destination when it is needed. Cloud computing will store the data and send the hash of
that data to the base station for future use. The contributions of the paper are as follows.
To improve the lifetime of the network, the ILEACH protocol is proposed.
A blockchain-based multi-hop routing scheme is proposed to send data in a convenient
way to the base station.
For reliable and efficient data storage, fog and cloud computing is utilized.
M.Faisal, G.Husnain
1 3
2 RELATED WORK
2.1 Single Point ofFailure inWSN
As we know that traditional IoT authentication protocols purely depend on a trusted third
party or centralized system which may cause sometimes a single point of failure problem,
as a result, the whole network collapse. Also, in [12], as we know that traditional routing
protocols completely depend upon the central authority CA. The central authority is used
to identify and authenticate each device in the network. Many challenges are faced while
using any CA i.e., trust, single point of failure. While using CA it also faces many attacks.
The main disadvantages of using CA are the single point of failure. Besides this, in [13],
the authors addressed that IoT plays a very dominant role in today’s world and provides
many services in our daily life. Many mechanisms have been proposed previously for secu-
rity attack detection that merely relies on a distributed and centralized architecture. How-
ever, due to their distributed and centralized structure, they tend to face some problems like
high computation cost, single point of failure, storage constraints, and high latency. It also
faces problems in collecting and monitoring important data throughout the network.
2.2 Cost inTerms ofComputational Power
Industrial IoT has had a great impact on the revolution of IoT. It provides an ease to the
industrial zone in terms of security, cost, time, etc. with the combination of IoT and block-
chain has gained relatively research interest in the past few decades. However, the high
demand for resources for blockchain and insufficient performance of IoT modes has not
been tackled well. Furthermore, due to the involvement of the Merkle tree, public key
infrastructure PKI and Proof of work PoW, blockchain required a huge amount of com-
putation power. Due to all these factors in [1416], it makes the blockchain very costly to
collaborate with IoT devices. In [17], blockchain technology is developing technology and
is used in distributed systems because of its capabilities i.e., trustworthiness. Different con-
sensus mechanisms are used to add transactions to the chain. However, it also faces a major
challenge by using PoW. Because PoW is very expensive in terms of computation power,
which is a very crucial issue in the blockchain. IoT has a great role in the development
of modern industries. IoT sensors can easily reduce the cost and human efforts with the
increase in production. However, IoT devices have also security concerns due to their low
computational power. The attackers can easily attack these devices and mitigate the perfor-
mance of the whole network [18]. Also, in [19], PoW is considered to be the original con-
sensus mechanism of blockchain technology. It is responsible for solving different math-
ematical puzzles. If we talk about the WSN environment, we know that nodes of WSN are
resource constraints. So, if we use PoW as a consensus mechanism in WSN, it will directly
affect the overall performance and lifetime of the network, because PoW required a large
amount of energy to solve the puzzles.
2.3 Data Storage ontheBlockchain
In [20], the development of smart cities is directly proportional to the development of
IoT. With the increase in IoT devices and data volume, issues are also increased such as
bandwidth bottleneck, privacy, high latency, and security. Security, computational power,
and storage resources are the basic need of IoT in a smart city. However, still, there is no
Blockchain Based Multi‑hop Routing andCost‑Effective…
1 3
security architecture made for smart cities to have more computational power and storage
capacity. Also, in [21], the nodes in the IoT network are not rich in resources, and their
monitoring, computational, and storage capabilities are very small. Deploying blockchain
on IoT networks leads to very serious storage problems. All the entities must save the same
ledger (record of a transaction) and this ledger keeps on increasing as transactions happen
in the network. And after a certain number of transactions, the IoT nodes become unable to
save the same repeated ledger. This issue is solved by saving only important information on
IoT devices and rather of the data is stored on some external storage. This leads to the syn-
chronization of data with mature blockchain. Synchronization of data demands large efforts
and IoT devices are not able to do such synchronization. Furthermore, in [22], data storage
is a very important factor. However, WSN nodes have very limited storage capacity, due to
which they can face many problems.
2.4 Detection ofMalicious Nodes
A wireless sensor network is considered to be a core technology that supports IoT opera-
tions. The fairness and traceability of malicious node detection cannot be guaranteed in
WSN. Similarly, in [23], the wireless sensor network is used everywhere in the world today
due to its specialties. However, it has also a lot of limitations like trustworthiness between
nodes, energy consumption, authentication, etc. In this paper, the author’s main focus is
trustworthiness among different nodes. The trust may be evaluated in terms of behavior or
data-based. To compute the behavior of a node in terms of trust, we calculate some met-
rics e.g., intimacy, closeness, frequency of interaction, and honesty. Also, in [24], with the
advancement in WSN technology, it also faces some challenges. During the communica-
tion between different sensor nodes, the network services are badly affected by malicious
nodes.
2.5 Authentication andOther Security Concerns
The lifetime of IoT devices is very low due to their small physical structure. So, it’s stor-
age capacity and computational power are very low. As a result, these devices are vulner-
able to many security attacks. Many solutions have been proposed to overcome the secu-
rity threats in IoT devices. However, no solution is proposed yet to get the desired result
against vulnerability [25]. Similarly, in [26], the wireless sensor network trustworthiness
of the routing is very important to ensure efficiency and routing security. A lot of studies
have been done to improve the route between different nodes by using trust management,
cryptographic system, etc. However, none of these have achieved the desired results. It is
also a very difficult task to identify the non-trusted behavior of the routing nodes in a real
environment. So, still, there is no effective way to overcome malicious node attacks. Also,
in [27], trustworthiness between the nodes is considered to be the foundation for success-
ful localization and secure communication in WSN. Besides this, in [28, 29], sensor net-
works SN and WSN play a very major role in the development of IoT. As we know that
authentication and trustworthiness are the most important factors for reliable communica-
tion between sensor nodes in an IoT environment. Many types of research have been done
to solve this crucial problem. However, none of them meet the desired solution for reli-
able communication. IoT environments also face some other problems like computational
power and energy consumption. Similarly, in [30], nodes are deployed in the environment
to monitor environmental changes. However, the privacy and security of these nodes are
M.Faisal, G.Husnain
1 3
still big issues. Both the sensor nodes and their sensed data are vulnerable to many internal
and external attacks. Many studies are done to solve these issues. However, they do not
completely describe the behavior and constraints of caching schemes in Information- cen-
tric networks. Also, in [28], IoT nodes are not rich in terms of resources and ability to do
simple processing. For complex processing and aggregation of data, they send data to base
stations and other authorities, which are rich in resources, for further processing. After pro-
cessing, these high authorities store this data, these storage platforms are centralized hav-
ing the issue of a single point of failure. Therefore, in centralized platforms (e.g. clouds),
the data is vulnerable to security threats.
3 Method
In this section, we design a WSN network. Then clustering protocol is used to select a
cluster head. After cluster head selection, a multi-hop scheme routing scheme is used to
send data to the base station. In the end, data is stored in fog and the cloud. Before going to
discuss the network model, this paper has some assumptions.
3.1 Assumptions
The MAC address of every node is unique.
Every node in the subnet must trust the base station.
Sensor nodes are deployed uniformly randomly
All sensor nodes are homogenous
All the sensor nodes have unique Ethernet address
The base station is a trustable entity in the network
The BS station has enough computational and storage power to serve the network for a
long time and cannot be died because of low power.
3.2 Network Model
WSN networks consist of thousands of nodes. Based on their capabilities these nodes are
divided into the base station, cluster head, and ordinary nodes.
Base station: The base station has abundant resources and it is considered to be the
most powerful entity of WSN networks in terms of storage capacity and computational
power. The base station is responsible to manage incoming and outcoming data. It is
directly connected to the private blockchain and fog computing. All nodes in the subnet
of the base station need to be registered. before joining the network, every new node
must register with the base station.
Cluster head: After the base station, the cluster head is the second most abundant
resource entity in the WSN environment. It is directly connected with the base station
and ordinary nodes. The main function of the cluster head is to receive sensing data
from the sensor nodes, process it and send it to the base station. Many sensor nodes are
connected to each cluster head. Similarly, many cluster heads are connected to the base
station directly.
Sensor nodes: These nodes are located at the edge of the network. Each sensor node
is connected to a single cluster head at a time. Sensor nodes can only sense data from
Blockchain Based Multi‑hop Routing andCost‑Effective…
1 3
the physical environment and send it to the cluster head. Due to its low computational
power, it could not perform other operations and processing as the cluster head and
base station do.
3.3 Proposed Model
3.3.1 Registration ofNodes
After deploying nodes in the network, the first step is to register all the nodes with the base
station. To do so, all thenodes send their MAC address to the base station. The base station
hashes the MAC address of each node by using keccak 256 and generates a unique id for
each node. This unique id is assigned to the concerned node. Also, these credentials are
stored in the fog for future purposes.
3.3.2 Cluster Head Selection
As we know that the work of the cluster head is to receive data from the sensor nodes and
send it to the base station. By receiving and sending data to the base station its energy is
depleted respectively. A time is reached when the cluster head energy becomes zero and is
unable to receive sensing data from sensor nodes, process it, and send it to the base station.
Due to this, the whole network will collapse. To mitigate this issue, we have proposed an
I-LEACH-based clustering protocol.
The proposed clustering scheme selects random clusters in the first round as the energy
of the total energy is the same in the starting. After cluster head selection, it sends an
advertisement message to all sensor nodes. By receiving an advertisement message, the
sensor nodes decided to which cluster it belongs. this decision will be taken based on min-
imum distance. After sensor nodes decide to which cluster it belongs, the sensor nodes
send their credentials to the cluster head. The cluster head updates its database and sends
all these credentials to the base station for further process. We assume that all the sensor
nodes send data to the cluster head.
We have set a threshold, when the energy of the cluster head becomes low from that
threshold, the new cluster head selection process will start. We have set three parameters
for new cluster head selection, residual energy a value of PDR, and the distance of an ON
from the base station, as shown in algorithm 1. In the first iteration, residual energy is
checked, if two nodes have the same residual energy, then the distance will be checked for
both nodes from the base station. The nodes having a minimum distance from the base sta-
tion should be considered a new cluster head. We have considered the minimum distance
of CHs with BS because the energy of CH is depleted rapidly when there is a large distance
between CH and BS.
When a sensor node sense data from the physical environment and sends it to the con-
cerned CH, the energy of both the sensor node and CH will be depleted while sending
and receiving the data. The depleted energy in sending the data packet to CH is calculated
below Eq.(1).
where ET X is the transmitting energy, m shows the packet size, Eelec represents the elec-
tronic energy, εfs shows the transmit amplifier type and d is the distance. Similarly, the
(1)
ETX
=
m
Eelec
+
m
𝜀
fs
d2
M.Faisal, G.Husnain
1 3
energy of the CH also depletes while receiving data from the sensor nodes as depicted in
Eq.(2).
where ERX is the CH energy consumed while receiving data from the sensor node. Besides
this, the energy depletion of CH depends on the number of sensor nodes connected to
it. The more data received from the sensor node; the more energy will be depleted, as in
Eq.(3)
where ERX is the CH consumed energy while receiving data packet m from sensor node n
connected to CH. The proposed system model of cost-effective and efficient routing based
on blockchain in WSN is shown in Fig.1:
3.3.3 Authentication
The authentication of nodes is an important factor. If two nodes want to communicate with
each other. It must be authenticated first. Suppose we have two nodes A and B, and they
want to communicate with each other. For this purpose, node A sends its credentials to the
CH to which it is attached. The credentials are node A id, the CH id to which it belongs,
and id of the node B to which it wants to communicate. CH verifies its authenticity and
sends these credentials to the BS. The BS compares these credentials with the information
stored on the private blockchain. The process will return an error if the credentials did not
match. A few other things are also verified. The BS also verifies that the existing node is
operational or dead. If it is found dead, the process will end at this stage. If both credentials
are the same then the BS executes the smart contract and sends a verification message to
(2)
ERX
=
m
Eelec
(3)
ERX
m
n
Blockchain Based Multi‑hop Routing andCost‑Effective…
1 3
the concerned node through CH. The same process is repeated at node B. Mutual authenti-
cation is needed only when both of the nodes belong to a different cluster. However, if they
belong to the same CH, they can communicate with each other directly. The process of
cluster formation and nomination of CH is presented in Fig.2.
3.3.4 Routing
As AODV is an on-demand routing protocol so it is suitable for the WSN environment
because WSN has limited energy, computational power, bandwidth, etc. We proposed an
Fig. 1 Proposed System Model
M.Faisal, G.Husnain
1 3
energy-efficient AODV (EEAODV) routing protocol. The route discovery and route main-
tenance are the same as in AODV. Suppose we have several routes from source to destina-
tion, we will choose the best route based on two parameters i.e., minimum hop count and
residual energy of the intermediate nodes. Using these parameters can help in the enhance-
ment of the lifetime of the network.
3.3.4.1 Route Discovery When a source node wants to send data to the destination. It will
first check its routing table information. If the path is available to the desired destination,
the source node will the data to the destination. However, if the path does not exist, then
the source node floods a route request (RREQ) message to its neighbor nodes. The RREQ
contains the source id, request-id, and destination id. These parameters make the RREQ
unique. After receiving RREQ, the neighbor nodes first verify request-id and source id. If
the request with the same parameters is already available, then the node discarded the new
RREQ. Otherwise, the RREQ will be forwarded to the destination. Upon receiving at the
destination end, a request-reply (RREP) message is generated and sent back to the source
node. At the same time both, the source node and other intermediate nodes can update their
routing table and then the source node can send data to the destination node.
3.3.4.2 Route Maintenance After finding a suitable route to the destination by route
discovery method. Failure of links may happen due to the WSN environment. Therefore,
intermediate nodes send Hello packets to the neighbor nodes to ensure that they are
Fig. 2 Clustering workflow
Blockchain Based Multi‑hop Routing andCost‑Effective…
1 3
active. Upon receiving this hello message, every intermediate node confirms the informa-
tion in the table regarding routing. If an invalid route is detected, it will delete the routing
information of that route and send a route error packet RERR to the source node. After
receiving RERR, the source node begins a new route discovery with new broadcasting.
In the proposed model, we have proposed an energy-efficient AODV (EEAODV) routing
protocol, motivated by [28].
3.3.4.3 Storing ofData Cloud storage is an emerging technology. We use both cloud and
fog storage to overcome the deficiencies of the cloud. Due to the high distance from the end-
user, the cloud faces some critical problems like high latency, high usage of bandwidth, high
consumption of energy, etc. Fog is used to mitigate the abovementioned issues faced by the
cloud as it is deployed near the end-user. It is a transient storage system. Which is capable
to receive data from the BS and perform some important tasks on the data like aggregation,
hashing, etc., and forwarding that data to the cloud for further processing and storage. There
are a few steps performed by fog, which are given below. Step 1: Calculate the Hash of data
d. In the very first step, when the BS sends data to the fog, the fog will first hash hi1 that data
using Keccak 256 hash algorithm. Step 2: Storing hash hi1 and data d. By hashing data di1,
it will generate a unique address. The hash of the data is sent to the BS and the data is sent
to the cloud for storage. Step 3: BS sends a request to the cloud for data d. The BS sends a
request to the cloud for data d retrieving. Step 4: BS calculate the hash. The Cloud sends
data d to the BS. The BS will calculate the hash hi2 of the data d by using Keccak 256 hash-
ing algorithm. Step 5: Comparison of hi1 and hi2. The BS will compare hi1 and hi2. If both
the hashes are the same, it means that the BS receives the right data, otherwise, the data will
be discarded. Similarly, the cloud provides convenient and secure data storage. Moreover,
the cost of storing data on cloud servers is very low.
4 Results andDiscussion
This section contains all results and a discussion of our proposed model. Step by step we
complete shown results in the form of figures as well as complete results description. In the
last section, we briefly describe and compare our proposed work with the existing research
study.
4.1 Tools andLanguage
In the proposed model we have used different tools and language. For the deployment of
nodes and graphical results, we used MATLAB. For smart contract deployment, we use
Remix IDE and in the last python is used for hashing.
4.2 Nodes Deployment
100 nodes are randomly (uniform) deployed in a 100 x 100 m square meter area. Each
cluster head has directly connected sensor nodes. The function of these sensor nodes is just
to sense data from the environment and send it to the concerned cluster head. Each cluster
M.Faisal, G.Husnain
1 3
has many sensor nodes and one cluster head. The simulation parameters for the proposed
system are presented in Table1:
4.3 Comparison ofProposed Model withALEACH
The simulation results in Fig.3 show that our proposed model is capable to survive the
network for a greater number of rounds as compared to the existing clustering protocol.
We used three parameters for the selection of cluster heads. i.e., residual energy, value
of PDR, and distance from the base station. In traditional ALEACH clustering protocol,
they used only energy as a parameter for CH selection. The ILEACH protocol outper-
forms ALEACH because ILEACH considers three parameters for new CH selection and
TABLE 1 Simulation parameters Parameters Values
Total Sensing Area 100 X 100 m2
Total number of Nodes 110
Total Base station 1
Total Cluster Heads 10
Total Ordinary Nodes 100
Nodes deployment Random
Number of iterations 25
Fig. 3 Comparative analysis of ILEACH vs ALEACH
Blockchain Based Multi‑hop Routing andCost‑Effective…
1 3
ALEACH considers only one. In the observation of Fig.3, the existing technique only
survives for 1000 rounds and our proposed model survives the network for 1400 rounds.
The reason is, that the existing clustering technique selects the CH only based on
energy, and we have used three parameters for CH selection, which is why our proposed
scheme serves the network for more rounds as compared to the benchmark scheme.
4.4 Comparison Between Different CHs
Figure4 shows the comparison of the average energy consumption of different clusters
of our proposed I-Leach protocol. The figure shows that different clusters have different
energy consumption. The reason is that the nodes in each cluster are randomly deployed
and each node has a different distance from its respective cluster head. In this way, the
data packet of each node has to cover different distances to reach the cluster. As we
know, the energy consumption directly depends upon the distance as shown in the fol-
lowing Eq.(4).
Because the ordinary nodes in each cluster head have different distances from their
respective cluster head, it is the reason that the average energy of cluster 1 and cluster 2
are different, as shown in the above figure. It is also depicted that the lifetime of cluster
1 is 500 rounds while cluster 2 has a lifetime of 450 rounds.
(4)
ETX
=mE
elec
+m𝜀fs d
2
Fig. 4 Comparative analysis between two CHs
M.Faisal, G.Husnain
1 3
4.5 Comparison ofPacket Delivery Ratio
Figure 5 shows the comparison between the PDR value of our proposed model and the
benchmark scheme [31]. The performance of our proposed model is better than the bench-
mark scheme. The reason is that nodes of the benchmark scheme die rapidly because of
inefficient energy consumption due to CH selection while only considering the residual
energy of the ON. On the other hand, in our proposed model the CHs are selected on the
bases of residual energy of ON, distance of ON from BS, and the value of PDR. Therefore,
our proposed model has a high PDR as compared to the benchmark scheme.
4.6 Execution Time ofNodes duringAuthentication
Figure6 shows the execution time of nodes required during authentication. In the figure,
we can see that the time taken to authenticate five nodes will take 13s. And it increases
gradually when the number of nodes increases.
5 Conclusion andFuture Work
The proposed model aims to provide an energy-efficient mechanism and cost-effective
storage for WSNs. We use MATLAB for network deployment and clustering. For smart
contracts and hashing, we use Remix and Python. The purpose of this study is to pro-
vide an optimal solution for energy consumption. Similarly, it will also provide a cost-
effective way to store data. We enhance the lifetime of the network as shown in Fig.3.
Fig. 5 Comparison of Packet delivery ratio
Blockchain Based Multi‑hop Routing andCost‑Effective…
1 3
Our proposed model can serve the network for a greater number of rounds as compared
to the benchmark clustering scheme. Similarly, as we know that storage cost of data on
blockchain is very expensive. As Blockchain is a distributed technology, a copy of each
ledger must be stored on all the entities in the network. As a result, the storage cost
of data is very high. To overcome this issue, we have used fog and cloud as a storage
medium. As our main aim of the study is to increase the lifetime of the WSN. Thus, we
proposed an energy-efficient AODV routing protocol. In the future, we will work more
to improve the performance of the network and increase the lifetime of the network.
Furthermore, we will add some other parameters for the selection of CH, like the degree
of node and reputation of the node. Similarly, we will also work on PoS and PoA con-
sensus mechanisms to increase the performance of the network.
Funding The author(s) received no specific funding for this work.
Data Availability All the data is within the main manuscript.
Code availability All the data is within the main manuscript.
Declarations
Competing interests The authors have declared that no competing interests exist.
Execution Time (sec)
60
50
40
30
20
10
05 10 15 20 25 30 35 40 45 50 55 60 65 70 75
Numberof Nodes
Fig. 6 Nodes Authentication Execution Time
M.Faisal, G.Husnain
1 3
References
1. Kandris, D., etal. (2020). Applications of Wireless Sensor Networks: An up-to-date survey. Applied
System Innovation, 3(1), 25–14. https:// doi. org/ 10. 3390/ asi30 10014
2. Srbinovski, B., etal. (2016). An energy aware adaptive sampling algorithm for energy harvesting wsn
with energy hungry sensors. Sensors, 16(4), 448.
3. Saeed, N., Ahmad, W., and Bhatti, D. M. S. (2018), Localization of vehicular ad-hoc networks with
RSS-based distance estimation, IEEE Xplore, https:// ieeex plore. ieee. org/ abstr act/ docum ent/ 83463 13
(accessed Jun. 05, 2023).
4. Akhondi, M. R., etal (2010). Applications of wireless sensor networks in the oil, gas, and resources
industries. IEEE Xplore, ieeexplore.ieee.org/abstract/document/5474813. Accessed 4 Apr. 2020.
5. Zyskind, G., et al (2015). Decentralizing privacy: Using blockchain to protect personal data. 2015
IEEE Security and Privacy Workshops, 3, (4), https:// doi. org/ 10. 1109/ spw. 2015. 27.
6. Utakaeva, IKh. (2019). Directions and Features of Application of the Blockchain Technology. Journal
of Physics: Conference Series, 1353, 012103. https:// doi. org/ 10. 1088/ 1742- 6596/ 1353/1/ 012103
7. Anwar ul Hassan, Ch. etal (2022). A liquid democracy enabled blockchain-based electronic voting
system. Scientific Programming, 2022(13), e1383007.
8. Treleaven, P., etal. (2017). Blockchain technology in finance. Computer, 50(9), 14–17. https:// doi. org/
10. 1109/ mc. 2017. 35710 47
9. Ahmad, W., Ahmed, S., Sheeraz, N., Khan, A., Ishtiaq, A. and Saba, M. (2020), Localization error
computation for rssi based positioning system in VANETs, IEEE Xplore, https:// ieeex plore. ieee. org/
abstr act/ docum ent/ 91941 92 (accessed Jun. 05, 2023).
10. Cui, Z., etal (2020). A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE
Transactions on Services Computing,
11. Ramezan, G., & Leung, C. (2018). A Blockchain-Based Contractual Routing Protocol for the Internet
of Things Using Smart Contracts. Wireless Communications and Mobile Computing, 2018(1), 1–14.
https:// doi. org/ 10. 1155/ 2018/ 40295 91
12. Rathore, S., etal. (2019). Blockdeepnet: A blockchain-based secure deep learning for iot network. Sus-
tainability, 11(14), 3974. https:// doi. org/ 10. 3390/ su111 43974
13. Haseeb K., etal (2019), Intrusion prevention framework for secure routing in wsn-based mobile inter-
net of things. IEEE Access
14. Liu, M., et al. (2018). Computation offloading and content caching in wireless blockchain networks
with mobile edge computing. IEEE Transactions on Vehicular Technology, 67(11), 11008–11021.
https:// doi. org/ 10. 1109/ tvt. 2018. 28663 65
15. Ahmad, W., Husnain, G., Ahmed, S., Aadil, F., & Lim, S. (2023). Received signal strength-based
localization for vehicle distance estimation in vehicular ad hoc networks (VANETs). Journal of Sen-
sors, 2023, e7826992. https:// doi. org/ 10. 1155/ 2023/ 78269 92
16. Sharma, P. K., & Park, J. H. (2018). Blockchain-based hybrid network architecture for the smart city.
Future Generation Computer Systems, 86, 650–655. https:// doi. org/ 10. 1016/j. future. 2018. 04. 060
17. Danzi, P., etal. (2019). Delay and communication tradeoffs for blockchain systems with lightweight iot
clients. IEEE Internet of Things Journal, 6(2), 2354–2365. https:// doi. org/ 10. 1109/ jiot. 2019. 29066 15
18. Kushch, S., and Francisco P-C. (2019). Blockchain for dynamic nodes in a smart city. IEEE Xplore,
,ieeexplore.ieee.org/abstract/document/8767336/. Accessed 29 Dec. 2021.
19. She, W., etal. (2019). Blockchain trust model for malicious node detection in wireless sensor net-
works. IEEE Access, 7, 38947–38956. https:// doi. org/ 10. 1109/ access. 2019. 29028 11. Acces sed8O ct.
2021
20. . Ullah,T., Hussnain, D. E. G., Ahmad, W., Sikander, G., and Ashfaq, M. (2023), An efficient machine
learning based multiclass cyber attacks classification and prediction, The Sciencetech, 4(1)
21. Kumar, M., etal (2020). Trust aware localized routing and class based dynamic block chain encryption
scheme for improved security in WSN. Journal of Ambient Intelligence and Humanized Computing
22. Hong, S. (2019). P2P Networking Based Internet of Things (IoT) Sensor Node Authentication by
Blockchain. Peer-To-Peer Networking and Applications. https:// doi. org/ 10. 1007/ s12083- 019- 00739-x
23. Khalil, A. E. K., Anwar, S., Husnain,G., Elahi,A., and Dong,Z. (2021), A novel bio-inspired path plan-
ning for autonomous underwater vehicle for search and tracing of underwater target, IEEE Xplore,.
https:// ieeex plore. ieee. org/ abstr act/ docum ent/ 96929 88 (accessed Jun. 05, 2023).
24. Gebremariam, G. G., Panda, J., & Indu, S. (2023). Blockchain-based secure localization against mali-
cious nodes in iot-based wireless sensor networks using federated learning. Wireless Communications
and Mobile Computing, 2023, 1–27. https:// doi. org/ 10. 1155/ 2023/ 80680 38
25. Kumar, R. L., Khan, F., Kadry, S., & Rho, S. (2022). A Survey on blockchain for industrial Internet of
Things. Alexandria Engineering Journal, 61(8), 6001–6022. https:// doi. org/ 10. 1016/j. aej. 2021. 11. 023
Blockchain Based Multi‑hop Routing andCost‑Effective…
1 3
26. Mori, S. (2018). Secure caching scheme by using blockchain for information-centric network-based
wireless sensor networks. Journal of Signal Processing, 22(3), 97–108. https:// doi. org/ 10. 2299/ jsp. 22.
97
27. Husnain, G., Anwar, S., Sikander, G., Ali, A., & Lim, S. (2023). A bio-inspired cluster optimization
schema for efficient routing in vehicular ad hoc networks (VANETs). Energies, 16(3), 1456. https://
doi. org/ 10. 3390/ en160 31456
28. Ren, Y., Liu, Y., Ji, S., Sangaiah, A. K., & Wang, J. (2018). Incentive mechanism of data storage based
on blockchain for wireless sensor networks. Mobile Information Systems, 2018, 1–10. https:// doi. org/
10. 1155/ 2018/ 68741 58
29. Mariyappan K. , Subaja Christo M., and . Khilar R.(2021), Implementation of FANET energy effi-
cient AODV routing protocols for flying ad hoc networks [FEEAODV], Materials Today: Proceedings,
https:// doi. org/ 10. 1016/j. matpr. 2021. 02. 673.
30. Anand, S. J., & Al, E. (2021). Iot-based secure and energy efficient scheme for precision agriculture
using blockchain and improved leach algorithm. Turkish Journal of Computer and Mathematics Edu-
cation (TURCOMAT), 12(10), 2466–2475. https:// doi. org/ 10. 17762/ turco mat. v12i10. 4857
31 Husnain, G., & Anwar, S. (2022). An intelligent probabilistic whale optimization algorithm (i-woa)
for clustering in vehicular ad hoc networks. International Journal of Wireless Information Networks,
29(2), 143–156. https:// doi. org/ 10. 1007/ s10776- 022- 00555-w
Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under
a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted
manuscript version of this article is solely governed by the terms of such publishing agreement and applicable
law.
Muhammad Faisal (MS) has accomplished his M.S degree in Com-
puter Sciences (Blockchain Technologies) from Iqra National Univer-
sity, Peshawar, Pakistan and BSc in Computer Sciences (Networks &
Telecommunications) from COMSATS, Islamabad, Pakistan. His
research interests include intelligent systems, wireless sensor net-
works, blockchain technologies, route clustering and artificial
intelligence.
Ghassan Husnain , (PhD, BE) has accomplished his Ph.D. degree in
intelligent ad hoc networks and bio-inspired computation from the
University of Engineering and Technology at Peshawar, Pakistan, and
MSc in Network Systems from University of Sunderland, England. He
is also an Assistant Professor with IQRA National University Pesha-
war. His research interests include sensor networks, wireless personal
communications, intelligent systems, vehicular ad hoc networks, evo-
lutionary computation, bio-inspired algorithms and artificial intelli-
gence .
Article
Full-text available
Vehicular ad hoc networks (VANETs) are an eminent area of intelligent transportation systems (ITS) which includes vehicle tracking, positioning, and emergency warnings. For protective applications, vehicle localization in the urban area is a significant problem. Global Positioning Systems (GPS) are one of the many solutions that have been offered, although they do not offer accuracy. To locate a target vehicle accurately, a unique approach called received signal strength-(RSS-) based localization scheme has been proposed. By detecting signals within its range, it establishes communication through roadside units (RSUs) and determines the typical RSS. Following the discovery of the RSS, the RSS-based localization algorithm helped in determining the precise position of the vehicle. The high signal-to-noise ratio of the proposed algorithm, which is derived from neighbouring RSUs, is its key component. The vehicle's Cramer Rao lower bound (CRLB) is examined after its position is discovered. Various experimentations considering dynamic vehicles ranging from 2 to 100, localization error, ranging error, and throughput have been conducted which demonstrates that the proposed algorithm (RSS) has better results (87%, 80%, and 120) than other well-established least squares (LS) and weighted least squares methods (WLS).
Article
Full-text available
Vehicular ad hoc networks (VANETs) are vital to many Intelligent Transportation System (ITS)-enabled technologies, including efficient traffic control, media applications, and encrypted financial transactions. Due to an increase in traffic, vehicular network topology is constantly changing, and sparse vehicle distribution (on highways) hinders network scalability. Thus, there is a challenge for all vehicles (in the network) to maintain a stable route, which would increase network instability. Concerning IoT-based network transportation, this study proposes a bio-inspired, cluster-based algorithm for routing, i.e., the intelligent, probability-based, and nature-inspired whale optimization algorithm (p-WOA), which produces cluster formation in vehicular communication. Various parameters, such as communication range, number of nodes, velocity, and route along the highway were considered, and their probaabilities were incorporated into the fitness function, hence resulting in randomness reduction. Results were compared to existing methods such as Ant Lion Optimizer (ALO) and Grey Wolf Optimization (GWO), demonstrating that the developed p-WOA technique produces an optimal number of cluster heads (CH). The results achieved by calculating the Packet Delivery Ratio (PDR), average throughput, and latency demonstrate the superiority of the proposed method over other well-established methodologies (ALO and GWO). This study confirms statistically that VANETs employing ITS applications optimize their clusters by a factor of 75, which has the twin benefits of decreasing communication costs and routing overhead and extending the life of the cluster as a whole.
Article
Full-text available
Wireless sensor networks are the core of the Internet of Things and are used in healthcare, locations, the military, and security. Threats to the security of wireless sensor networks built on the Internet of Things (IoT-WSNs) can come from a variety of sources. This study proposes secure attack localization and detection in IoT-WSNs to improve security and service delivery. The technique used blockchain-based cascade encryption and trust evaluation in a hierarchical design to generate blockchain trust values before beacon nodes broadcast data to the base station. Simulation results reveal that cascading encryption and feature assessment measure the trust value of nodes by rewarding each other for service provisioning and trust by removing malicious nodes that reduce localization accuracy and quality of service in the network. Federated machine learning improves data security and transmission by merging raw device data and placing malicious threats in the blockchain. Malicious nodes are classified through federated learning. Federated learning combines hybrid random forest, gradient boost, ensemble learning, K -means clustering, and support vector machine approaches to classify harmful nodes via a feature assessment process. Comparing the proposed system to current ones shows an average detection and classification accuracy of 100% for binary and 99.95% for multiclass. This demonstrates that the suggested approach works well for large-scale IoT-WSNs, both in terms of performance and security, when utilizing heterogeneous wireless senor networks for the providing of secure services.
Article
Full-text available
Vehicular ad hoc networks an important network type plays a significant role in various applications, such as traffic administration, media applications, secure financial transaction, etc. In VANETs, topology rapidly changes due to high vehicle movements, and scarce vehicle distribution (on highways) affects network scalability which makes the cluster of VANETs unstable and difficult to maintain routes of all vehicles in a network These challenges appeal to researchers' attention to allow vigorous, consistent, and scalable transmission and receiving of data, particularly in a highly compact network. This framework proposes and demonstrates an efficient clustering technique for routing optimization in Intelligent Transportation Systems (ITS). An intelligent probability-based bio-inspired Whale Optimization Algorithm for clustering in VANETs (i-WOA) has been proposed considering communication range, the number of nodes (density), velocity, route on the highway during the process of cluster formation for vehicular communication by incorporating fitness function probability thus minimizing the randomness. The results were compared with already established methods and demonstrate that the proposed i-WOA method produces an optimal number of cluster heads (CHs) in various scenarios, for instance, communication ranges, network size, and node density. Statistical tests are performed to further validate developed method superiority over other established bio-inspired methods. The results exhibit a 75% (regression analysis) improvement in cluster optimization for VANETs with application in ITS, consequently reducing communication cost and routing overhead hence increasing network lifetime.
Conference Paper
Full-text available
Underwater search and tracing is a complex engineering problem, due to various factors, such as unpredicted oceanic environment, poor communications, underwater navigations. Therefore, to accomplish a challenging mission an autonomous underwater vehicle (AUV) cooperation is needed. This study focuses on the search and tracing of an underwater target, based on an improved cooperative path planning model. To achieve the possible results, the mission is divided into search and tracing phases aiming to maximize the search space thus reducing terminal error respectively. The developed method is inspired by bio-inspired Improved Whale Optimization Algorithm (IWOA) based method, hence modeling improved path for autonomous underwater vehicle followed by simulations of various parameters for experimentation, such as maneuverability and communication ranges between autonomous vehicles, in a distributed or centralized scenarios. For the above process, the IWOA is compared with the improved particle swarm optimization (IPSO) algorithm for different parameters for the search and tracing of the underwater target. The simulated results exhibit that the proposed method presents superior results for the search and tracing phase, which also increases the computational performance together with well-achieved optimization on large-scale complex problems for cooperative path planning.
Article
Full-text available
Developing an electronic voting system that meets the practical needs of administrators has been a difficult task for a long time. Now, blockchain technologies solve this problem by providing a distributed ledger with immutable, encrypted, and secure transactions. Distributed ledger technologies are an interesting technological leap in the field of data innovation, transparency, and trustability. In public blockchain, distributed ledger technology is widely used. The blockchain technology can be used in an almost infinite number of ways to benefit from sharing economies. The purpose of this study is to assess how blockchain may be utilized to build electronic voting systems that can be used as a service. The purpose of electronic voting systems is explained in this article, as are the technological and legal limitations of employing blockchain as a service. Then, using blockchain as a foundation, we propose a new electronic voting system that fixes the flaws we observed. In general, this paper evaluates the capabilities of distributed ledger technologies by depicting a contextual investigation in order to fine-tune the process of political election decisions and employing a blockchain-based application that improves security and lowers the cost of conducting nationwide elections.
Article
Full-text available
Blockchain and the Internet of Things (IoT) are separately regarded as highly capable popular technologies. Blockchain is a database used for decentralized transaction purposes. It provides novel directions to store and manage data, whereas IoT relates to the propagation of linked machines by providing information through the Internet. A mixture of Blockchain and the IoT appears hopeful, even though blockchain requires real-time data application, and IoT describes processes to store and manage information overloads safely and proficiently. The technology is significant to the manufacturing business, experiencing a digital revolution by incorporating equipment, developments, and data, leading to the Industrial IoT (IIoT). Such a combination of IIoT and blockchain is termed Blockchain for Industrial Internet of Things (BIIoT). The paper gives a detailed survey on BIIoT and discusses all relevant aspects of this novel concept. Firstly, IoT as a concept has been explored briefly, and relevant threats to IoT has been investigated. Furthermore, the domain of IIoT and the relevant challenges to IIoT is discussed. Additionally, an overview of blockchain technology is presented. Subsequently, a combination of IIoT and blockchain is explored, and the BIIoT structural design proposal is submitted. Finally, issues related to the use of IIoT with blockchain for industrial applications of BIIoT is explored. Thus, all relevant open research directions in Blockchain and IIoT are summarized in this paper. This survey shows that the proposed BIIoT is used to develop a redundant, traceable, and secure complex interconnected IIoT environment. Furthermore, the BIIoT system enables us to communicate with each other without the need for a trusted intermediary in a decentralized, unreliable, peer-to-peer network.
Article
Full-text available
The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expected performance. Towards performance hike, a novel trust aware localized routing and class based dynamic encryption scheme has been presented. The method first discovers the route to reach the destination and transmit the data packet. But the localized nature of each hop in the route estimates the trust measure for each neighbor according to their prior involvement in data transmission and number of retransmission of the same packets with other neighbor, number of successful transmission. By identifying the values of those parameters, the value of trusted data forwarding support (TDFS) is measured. According to the TDFS value of several routes, a route with the specific neighbor only selected for route selection. On the other side, the method maintains and classifies the data being transmitting into number of classes. Further, the method uses different signature and encryption schemes for various classes. The data has been encrypted with class specific scheme and key before transmission. The method generates a block chain where each block contains the part of encrypted data and represented by a hash and pointer to the next block. The same has been reversed to produce original data from the encrypted key. The method introduces higher performance data security and improves the overall network performance.
Article
In this technology driven world, wireless networks take part a key role in helping a society to enhance their life style.Unmanned air vehicles connected in an ad hoc manner been used in various application from civil projects to military applications. Establishing reliable, secure connection among UAV nodes in FANET is bit challenging task due to high node mobility, environmental condition under which it is operated and minimum energy capability of nodes etc. Routing protocols used in such a network should have unique features that overcome the limitation to make reliable and secured connectivity between nodes. All system units in flying UAV like transmitter, receiver equipment, control unit, information processing unit and payloads are powered by in build power sources .UAVs equipped with the limited on-board energy capability restrict the flying time, which will significantly affect the performance of a FANETs. Optimizing the energy consumption among nodes is one of the important research challenges .Optimization techniques for energy usage can be implemented at different OSI layer level. In our study we focused on OSI networks layers solution for performance improvements based on energy efficient routing techniques in flying ad hoc network environments. Routing algorithm that is used in MANETs applications can be optimized and used in FANETS as in both networks majority of the operational characteristics similar.