Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network
Abstract
:1. Introduction
2. Theoretical Background
3. Methodology
3.1. Performance Indices
3.1.1. Key Characteristics of Blockchain
- Autonomous: This is considered one of the most important aspects of a blockchain system, as no one is controlling or governing the system.
- Immutability: Blockchain is used for security purposes in many applications because it cannot be manipulated without a trace using currently known technology.
- Contractual: The blockchain creates consensus between the chains or peers. The consensus process is executed autonomously using rules according to the data status, contributing to the full autonomy of the system.
3.1.2. Data Security in Wireless Networks
- Data availability refers to ensuring robust security in the sensor network, to protect the resources or the sensor nodes. The nodes in the sensor networks must have self-protection to avoid unnecessary message processing or task execution. This can reduce energy use and increase the life span of the sensor network. Wireless sensor networks are susceptible to multiple types of denial of service attacks, node compromise attacks, and resource consumption attacks [52]. Therefore, the availability and security of resources must be effectively maintained.
- Data confidentiality can be achieved by allowing only authenticated users to access data or devices in the system to send messages. In sensor networks, data can be protected using cryptographic methods to allow only authenticated users to access it. Unauthorized or third parties cannot read the original data if confidentiality is effectively provided [53]. Therefore, to have data confidentiality, wireless sensor networks must use encryption methods.
- Data authentication in sensor networks allows the system to verify whether data is sent from authorized sources or not, and also protects the original data from alterations.
- Data integrity in sensor networks is necessary to verify the information reliability and capacity, to ensure that the message has not been damaged, altered, or changed. The integrity of the network is violated when the malicious node in the network sends false data with a valid identifier id.
- Time synchronization is important in systems with sensor node uptime coordination, as a more collaborative sensor network may involve group synchronization.
3.1.3. System Performance Metrics
4. System Architecture
Blockchain Design
- Timestamp: This attribute is necessary to know when the block was created in all transactions.
- Block hash: This hash is important because it will be linked to the future block. The hash is created based on the transactions of the day. If a piece of information is modified, the hash no longer matches the one registered in this field.
- Block number: This data represents the position the block occupies in the chain to know the number of blocks that the blockchain system contains.
5. Results
- 1.4 GHz 64-bit quad-core processor
- Dual-band wireless Local Area Network (LAN)
- 4 GB de Random Access Memory (RAM)
- Operating System (OS) Raspbian
6. Discussion
6.1. Hardware Performance
6.2. Security Analysis
- Basic security: As stated in Reference [77], it is defined in three fundamental security aspects: confidentiality, integrity, and availability (CIA).
- DDoS attack: It is understood as the resistance or not to this type of attack, based on its architecture and model.
- Linking attack: It is identified as the resistant or not to this type of attack, based on the architecture it proposes.
- Interoperability: This feature refers to whether all the model layers exchange information and use the exchanged information.
- Cryptographic tools: Tools that were used or not used for the development of the IoT system.
- Type of blockchain: Identified as private, public, or consortium.
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Han, Q.; Liang, S.; Zhang, H. Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world. IEEE Netw. 2015, 29, 40–45. [Google Scholar] [CrossRef]
- Dauwed, M.; Meri, A. IOT Service Utilisation in Healthcare. In IoT and Smart Home Automation; IntechOpen: London, UK, 2019. [Google Scholar]
- Gotarane, V.; Raskar, S. IoT practices in military applications. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25 April 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 891–894. [Google Scholar]
- Vela-Medina, J.C.; Guerrero-Sánchez, A.E.; Rivas-Araiza, J.E.; Rivas-Araiza, E.A. Face detection for efficient video-surveillance IoT based embedded system. In Proceedings of the 2018 IEEE International Conference on Automation/XXIII Congress of the Chilean Association of Automatic Control (ICA-ACCA), Concepcion, Chile, 17–19 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Islam, M.R.; Sarker, S.; Mazumder, M.S.; Ranim, M.R. An IoT based Real-time Low Cost Smart Energy Meter Monitoring System using Android Application. arXiv 2020, arXiv:2001.10350. [Google Scholar]
- The Future of IoT Miniguide: The Burgeoning IoT Market Continues. Available online: https://www.cisco.com/c/en/us/solutions/internet-of-things/future-of-iot.html (accessed on 14 March 2020).
- Payne, E.K.; Lu, S.; Wang, Q.; Wu, L. Concept of Designing Thermal Condition Monitoring System with ZigBee/GSM Communication Link for Distributed Energy Resources Network in Rural and Remote Applications. Processes 2019, 7, 383. [Google Scholar] [CrossRef] [Green Version]
- Hidayat, M.S.; Nugroho, A.P.; Sutiarso, L.; Okayasu, T. Development of environmental monitoring systems based on LoRa with cloud integration for rural area. In IOP Conference Series: Earth and Environmental Science; IOP Publishing: Bristol, UK, 2019; Volume 355, p. 012010. [Google Scholar]
- Feng, L.; Zhang, H.; Lou, L.; Chen, Y. A blockchain-based collocation storage architecture for data security process platform of WSN. In Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD), Nanjing, China, 9–11 May 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 75–80. [Google Scholar]
- Lee, S.H.; Lee, S.; Song, H.; Lee, H.S. Wireless sensor network design for tactical military applications: Remote large-scale environments. In Proceedings of the MILCOM 2009—2009 IEEE Military Communications Conference, Boston, MA, USA, 18–21 October 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 1–7. [Google Scholar]
- Zeybek, T.; Chang, C.H.; Yang, Z. An IoT Implementation for Manufacturing Using Wi-Fi, 6LoWPAN, and MQTT. In Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN), Beijing, China, 25–27 February 2019; pp. 362–366. [Google Scholar]
- Andy, S.; Rahardjo, B.; Hanindhito, B. Attack scenarios and security analysis of MQTT communication protocol in IoT system. In Proceedings of the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia, 19–21 September 2017; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
- Dhingra, S.; Madda, R.B.; Gandomi, A.H.; Patan, R.; Daneshmand, M. Internet of Things Mobile–Air Pollution Monitoring System (IoT-Mobair). IEEE Internet of Things J. 2019, 6, 5577–5584. [Google Scholar] [CrossRef]
- Simitha, K.M.; Raj, S. IoT and WSN Based Water Quality Monitoring System. In Proceedings of the 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 12–14 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 205–210. [Google Scholar]
- IoT Attacks Escalating with a 217.5% Increase in Volume. Available online: https://www.bleepingcomputer.com/news/security/iot-attacks-escalating-with-a-2175-percent-increase-in-volume/ (accessed on 11 February 2020).
- Jawad, K.; Mansoor, K.; Baig, A.F.; Ghani, A.; Naseem, A. An Improved three-factor. anonymous Authentication Protocol for WSN s based IoT System Using Symmetric cryptography. In Proceedings of the 2019 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan, 20–21 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 53–59. [Google Scholar]
- Elhoseny, M.; Hassanien, A.E. Secure data transmission in WSN: An overview. In Dynamic Wireless Sensor Networks; Springer: Cham, Switzerland, 2019; pp. 115–143. [Google Scholar]
- Hammi, M.T.; Bellot, P.; Serhrouchni, A. BCTrust: A decentralized authentication blockchain-based mechanism. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Dwivedi, A.D.; Srivastava, G.; Dhar, S.; Singh, R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 2019, 19, 326. [Google Scholar] [CrossRef] [Green Version]
- Casado-Vara, R.; Corchado, J. Distributed e-health wide-world accounting ledger via blockchain. J. Intell. Fuzzy Syst. 2019, 36, 2381–2386. [Google Scholar] [CrossRef]
- Rose, S.H.; Jayasree, T. Detection of jamming attack using timestamp for WSN. Ad Hoc Netw. 2019, 91, 101874. [Google Scholar] [CrossRef]
- Mehetre, D.C.; Roslin, S.E.; Wagh, S.J. Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Clust. Comput. 2019, 22, 1313–1328. [Google Scholar] [CrossRef]
- Shafagh, H.; Hithnawi, A.; Droescher, A.; Duquennoy, S.; Hu, W. Talos: Encrypted query processing for the internet of things. In Proceedings of the 13th ACM conference on embedded networked sensor systems, Seoul, Korea, 1–4 November 2015; pp. 197–210. [Google Scholar]
- Casado-Vara, R.; Chamoso, P.; De la Prieta, F.; Prieto, J.; Corchado, J.M. Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management. Inf. Fusion 2019, 49, 227–239. [Google Scholar] [CrossRef]
- Haseeb, K.; Islam, N.; Almogren, A.; Din, I.U. Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things. IEEE Access 2019, 7, 185496–185505. [Google Scholar] [CrossRef]
- Kim, T.H.; Goyat, R.; Rai, M.K.; Kumar, G.; Buchanan, W.J.; Saha, R.; Thomas, R. A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access 2019, 7, 184133–184144. [Google Scholar] [CrossRef]
- Mohanty, S.N.; Ramya, K.C.; Rani, S.S.; Gupta, D.; Shankar, K.; Lakshmanaprabu, S.K.; Khanna, A. An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Gener. Comput. Syst. 2020, 102, 1027–1037. [Google Scholar] [CrossRef]
- Shafagh, H.; Burkhalter, L.; Hithnawi, A.; Duquennoy, S. Towards blockchain-based auditable storage and sharing of IoT data. In Proceedings of the 2017 Cloud Computing Security Workshop, Dallas, TX, USA, 3 November 2017; pp. 45–50. [Google Scholar]
- SparkFun ESP8266 Thing—Dev Board. Available online: https://www.sparkfun.com/products/13711 (accessed on 11 February 2020).
- SimpleLink Wi-Fi® and Internet-of-Things Solution, a Single-Chip Wireless MCU. Available online: http://www.ti.com/product/CC3200 (accessed on 11 February 2020).
- Módulo Lua Wifi ESP8266 ESP-12E CP2102 NodeMCU v1.0 V2. Available online: http://ipowerelectronics.com/modulos/2257-modulo-lua-wifi-esp8266-nodemcu-v10-v2.html (accessed on 11 February 2020).
- Nakamoto, S. Bitcoin Whitepaper. 2008. Available online: https://bitcoin.org/bitcoin.pdf- (accessed on 17 July 2019).
- Corbet, S.; Lucey, B.; Urquhart, A.; Yarovaya, L. Cryptocurrencies as a financial asset: A systematic analysis. Int. Rev. Financ. Anal. 2019, 62, 182–199. [Google Scholar] [CrossRef] [Green Version]
- Al Omar, A.; Bhuiyan MZ, A.; Basu, A.; Kiyomoto, S.; Rahman, M.S. Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future Gener. Comput. Syst. 2019, 95, 511–521. [Google Scholar] [CrossRef]
- Niranjanamurthy, M.; Nithya, B.N.; Jagannatha, S. Analysis of blockchain technology: Pros, cons and SWOT. Clust. Comput. 2019, 22, 14743–14757. [Google Scholar] [CrossRef]
- Catalini, C.; Jagadeesan, R.; Kominers, S.D. Market Design for a Blockchain-Based Financial System. SSRN 3396834. 2019. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3396834 (accessed on 7 May 2020).
- Zeadally, S.; Das, A.K.; Sklavos, N. Cryptographic technologies and protocol standards for Internet of Things. Internet Things 2019, 100075. [Google Scholar] [CrossRef]
- Li, H.; Zhu, L.; Shen, M.; Gao, F.; Tao, X.; Liu, S. Blockchain-based data preservation system for medical data. J. Med. Syst. 2018, 42, 141. [Google Scholar] [CrossRef]
- Fakhri, D.; Mutijarsa, K. Secure IoT communication using blockchain technology. In Proceedings of the 2018 International Symposium on Electronics and Smart Devices (ISESD), Bandung, Indonesia, 23–24 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Gill, I.S.; Jat, D.S. Advanced encryption standard with Randomized round keys for communication security in IoT networks. In The IoT and the Next Revolutions Automating the World; IGI Global: Hershey, PA, USA, 2019; pp. 280–288. [Google Scholar]
- Khan, S.; Gupta, N.; Raut, G.; Rajput, G.; Pandey, J.G.; Vishvakarma, S.K. An ultra-low power AES architecture for IoT. In Proceedings of the International Symposium on VLSI Design and Test, Indore, India, 4–6 July 2019; Springer: Singapore, 2019; pp. 334–344. [Google Scholar]
- Durairaj, M.; Muthuramalingam, K. A lightweight multi-level encryption model for IoT applications. In Cybersecurity and Secure Information Systems; Springer: Cham, Switzerland, 2019; pp. 17–29. [Google Scholar]
- IoT Security—Cryptography. Available online: https://www.embedded.com/iot-security-cryptography/ (accessed on 15 March 2020).
- Su, N.; Zhang, Y.; Li, M. Research on Data Encryption Standard Based on AES Algorithm in Internet of Things Environment. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 March 2019; pp. 2071–2075. [Google Scholar]
- Jangirala, S.; Das, A.K.; Vasilakos A., V. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Trans. Ind. Informa. 2019. [Google Scholar] [CrossRef]
- Feng, Q.; He, D.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 2019, 126, 45–58. [Google Scholar] [CrossRef]
- Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar] [CrossRef]
- Lin, C.; He, D.; Huang, X.; Choo KK, R.; Vasilakos, A.V. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 2018, 116, 42–52. [Google Scholar] [CrossRef]
- Dai, H.N.; Wong RC, W.; Wang, H.; Zheng, Z.; Vasilakos, A.V. Big data analytics for large-scale wireless networks: Challenges and opportunities. ACM Comput. Surv. CSUR 2019, 52, 1–36. [Google Scholar] [CrossRef] [Green Version]
- Analysis of Data Security in Wireless Networks. Available online: https://ukdiss.com/examples/providing-location-aware-end-to-end-data-security-in-wireless-sensor-networks.php (accessed on 27 April 2020).
- Ren, K.; Lou, W.; Zhang, Y. LEDS: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans. Mob. Comput. 2008, 7, 585–598. [Google Scholar] [CrossRef]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef] [Green Version]
- Poor, H.V.; Schaefer, R.F. Wireless physical layer security. Proc. Natl. Acad. Sci. USA 2017, 114, 19–26. [Google Scholar] [CrossRef] [Green Version]
- Yang, Y.; Zheng, X.; Guo, W.; Liu, X.; Chang, V. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf. Sci. 2019, 479, 567–592. [Google Scholar] [CrossRef]
- Qadri, Y.A.; Nauman, A.; Zikria, Y.B.; Vasilakos, A.V.; Kim, S.W. The Future of Healthcare Internet of Things: A Survey of Emerging Technologies. IEEE Commun. Surv. Tutor. 2020. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Kumar, N.; Conti, M.; Vasilakos, A.V. A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE J. Biomed. Health Inform. 2017, 22, 1299–1309. [Google Scholar] [CrossRef]
- Mollah, M.B.; Azad MA, K.; Vasilakos, A. Security and privacy challenges in mobile cloud computing: Survey and way ahead. J. Netw. Comput. Appl. 2017, 84, 38–54. [Google Scholar] [CrossRef]
- Kaur, T.; Kumar, D. A survey on QoS mechanisms in WSN for computational intelligence based routing protocols. Wirel. Netw. 2019, 26, 2465–2486. [Google Scholar] [CrossRef]
- Aichernig, B.K.; Schumi, R. How fast is MQTT? In Proceedings of the International Conference on Quantitative Evaluation of Systems, Beijing, China, 4–7 September 2018; Springer: Cham, Switzerland, 2018; pp. 36–52. [Google Scholar]
- Benchmark of MQTT Servers. Available online: http://www.scalagent.com/IMG/pdf/Benchmark_MQTT_servers-v1-1.pdf/ (accessed on 1 May 2020).
- Blockchain Fundamentals: Latency & Capacity—Featuring the Ark Ecosystem. Available online: https://medium.com/ku-blockchain-institute/blockchain-fundamentals-featuring-the-ark-ecosystem-part-1-af1f9052e579 (accessed on 2 May 2020).
- Bi, W.; Yang, H.; Zheng, M. An accelerated method for message propagation in blockchain networks. arXiv 2018, arXiv:1809.00455. [Google Scholar]
- Chapter 3. Real-Time and Low Latency. Available online: https://docs.fedoraproject.org/en-US/Fedora/15/html/Musicians_Guide/chap-Musicians_Guide-Real_Time_and_Low_Latency.html (accessed on 2 May 2020).
- Khanafer, M.; Al-Anbagi, I.; Mouftah, H.T. An optimized WSN design for latency-critical smart grid applications. J. Sens. 2017, 2017, 5274715. [Google Scholar] [CrossRef] [Green Version]
- Weiner, M.; Jorgovanovic, M.; Sahai, A.; Nikolié, B. Design of a low-latency, high-reliability wireless communication system for control applications. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 3829–3835. [Google Scholar]
- Ahmad, A.; Roslan, M.F.; Amira, A. Throughput, latency and cost comparisons of microcontroller-based implementations of wireless sensor network (WSN) in high jump sports. AIP Conf. Proc. 2017, 1883, 020010. [Google Scholar]
- Bakni, M.; Manuel, L.; Chacón, M.; Cardinale, Y.; Terrasson, G.; Curea, O. WSN Simulators Evaluation: An Approach Focusing on Energy awareness. Int. J. Wirel. Mob. Netw. 2020, 11, 1–20. [Google Scholar] [CrossRef]
- How Does Temperature Affect the Performance of Computer Components? Available online: https://smallbusiness.chron.com/temperature-affect-performance-computer-components-28197.html (accessed on 2 May 2020).
- Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the Internet of Things: Perspectives and challenges. Wirel. Netw. 2014, 20, 2481–2501. [Google Scholar] [CrossRef]
- Huang, M.; Liu, A.; Xiong, N.N.; Wang, T.; Vasilakos, A.V. An Effective Service-Oriented Networking Management Architecture for 5G-Enabled Internet of Things. Comput. Netw. 2020, 173, 107208. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Bhat, V.; Vasilakos, A.V. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Appl. 2020, 150, 102496. [Google Scholar] [CrossRef]
- Dener, M. Security analysis in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 10, 303501. [Google Scholar] [CrossRef]
- Rusinek, D.; Ksiezopolski, B.; Wierzbicki, A. Security trade-off and energy efficiency analysis in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 943475. [Google Scholar] [CrossRef]
- Rani, A.; Kumar, S. A survey of security in wireless sensor networks. In Proceedings of the 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 9–10 February 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–5. [Google Scholar]
- Finogeev, A.G.; Finogeev, A.A. Information attacks and security in wireless sensor networks of industrial SCADA systems. J. Ind. Inf. Integr. 2017, 5, 6–16. [Google Scholar] [CrossRef]
- The Raspberry pi 3 Max Temperature. Available online: https://makezine.com/2016/03/02/raspberry-pi-3-not-halt-catch-fire/ (accessed on 10 March 2020).
- Komninos, N.; Philippou, E.; Pitsillides, A. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 2014, 16, 1933–1954. [Google Scholar] [CrossRef]
- Munir, M.S.; Bajwa, I.S.; Cheema, S.M. An intelligent and secure smart watering system using fuzzy logic and blockchain. Comput. Electr. Eng. 2019, 77, 109–119. [Google Scholar] [CrossRef]
- Tantidham, T.; Aung, Y.N. Emergency Service for Smart Home System Using Ethereum Blockchain: System and Architecture. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kyoto, Japan, 11–15 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 888–893. [Google Scholar]
Cryptographic Tool | Key Size (bit) | Block Size (bit) | Round |
---|---|---|---|
*DES | 56 | 64 | 16 |
*3DES | 168,112,64 | 64 | 48 |
*DES-X | 184 | 64 | 16 |
*AES | 128,192,256 | 128 | It depends on the block size |
Skipjack | 80 | 64 | 32 |
*HIGHT | 128 | 64 | 32 |
Security Criteria | Reference [78] | Reference [79] | Current |
---|---|---|---|
Basic Security Aspects | |||
*DDoS attack | |||
Linking attack | |||
Interoperability | |||
Cryptographic tools | --- | --- | Hashand AES |
Blockchain type | Public | Public | Private |
Advantages | Disadvantages | |
---|---|---|
Basic Security Aspects | Confidentiality, integrity, and availability to the IoT system and the information it shares. | It can disturb the performance of the system, it depends on the resources that are used. |
Decentralization | The decentralized approach helps the overall security and integrity of the system. | It could represent a high computational cost for the system. |
Topic-based publish-subscribe architecture | Prevent unknown devices from spamming the system, trying to spread malware, or launching a Distributed Denial of Service (DDoS) attack. | A static architecture could be represented as a limitation for some IoT systems. |
MQTT communication protocol | Due to its characteristics, it can boast of having a really low consumption as well as using very few resources for its operation. | Being designed as a lightweight protocol, the use of cryptographic tools for data transmission is not contemplated. |
Cryptographic tools | Integrity and reliability of the information that is shared locally and externally. | It could represent a high computational cost for the system, depending on the resources used and the way they are applied. |
Blockchain type | A private blockchain is custom-designed based on the needs of the system. | The needs of the IoT system change according to time and interaction with users. Blockchain’s designs, being more robust, cover the needs of the system without having to make changes to the design. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Guerrero-Sanchez, A.E.; Rivas-Araiza, E.A.; Gonzalez-Cordoba, J.L.; Toledano-Ayala, M.; Takacs, A. Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network. Sensors 2020, 20, 2798. https://doi.org/10.3390/s20102798
Guerrero-Sanchez AE, Rivas-Araiza EA, Gonzalez-Cordoba JL, Toledano-Ayala M, Takacs A. Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network. Sensors. 2020; 20(10):2798. https://doi.org/10.3390/s20102798
Chicago/Turabian StyleGuerrero-Sanchez, Alma E., Edgar A. Rivas-Araiza, Jose Luis Gonzalez-Cordoba, Manuel Toledano-Ayala, and Andras Takacs. 2020. "Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network" Sensors 20, no. 10: 2798. https://doi.org/10.3390/s20102798
APA StyleGuerrero-Sanchez, A. E., Rivas-Araiza, E. A., Gonzalez-Cordoba, J. L., Toledano-Ayala, M., & Takacs, A. (2020). Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network. Sensors, 20(10), 2798. https://doi.org/10.3390/s20102798