Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain
Abstract
:1. Introduction
- A simplified and novel computational framework has been presented for efficient resource management while facilitating seamless communication among mobile sensors.
- This paper presents a novel validation mechanism supported by the unique enrollment of the identity of nodes with a distinct generation process of secret keys for securing internal communications among the nodes.
- An Ethereum blockchain has been used to further strengthen the validation process by presenting a distributed consensus method, whereas hashing and incognito coefficients have been used for privacy preservation.
- A novel trust computation mechanism has been presented that enables nodes to estimate trust under all dynamic scenarios of sensor nodes.
- The proposed system has introduced a novel cost modeling that estimates cost and enhances user experience.
2. Related Work
3. Problem Description
- Sub-Optimal Scalability: Existing blockchain networks often struggle with scalability as the number of nodes and transactions increases [28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53]. In sensor networks, where thousands or even millions of devices generate data and transactions, scalability becomes a significant concern. Each node’s computational and storage requirements grow with the blockchain, potentially leading to performance degradation and decreased efficiency.
- Extensive Energy Consumption: Traditional blockchain consensus mechanisms, such as Proof-of-Work (PoW), require significant computational power and energy consumption [42]. This is particularly problematic for resource-constrained sensor networks with limited battery life. Energy-efficient consensus mechanisms like Proof-of-Stake (PoS) or delegated consensus are more suitable but still need careful consideration [46,48].
- Storage Requirements: Storing a full copy of the blockchain ledger on each node consumes considerable storage space, which may be limited in sensor devices [46,48]. As the blockchain grows over time, storage requirements increase, potentially exceeding the capacity of sensor devices. Managing and pruning historical data while maintaining blockchain integrity remains a challenge.
- Bandwidth Constraints: Blockchain transactions and communication with other nodes consume network bandwidth. Blockchain-related traffic can compete with sensor data transmission in sensor networks with constrained or intermittent communication channels, leading to congestion and delays [38].
- Latency: The validation and consensus processes required for blockchain transactions introduce latency, which can be problematic for time-sensitive applications [39]. Balancing transaction validation with the need for low latency is essential in sensor networks.
- Communication Modes: We introduce two distinct modes of communication—node-to-node (N2N) and node-to-structure (N2S)—to enhance data exchange capabilities and improve scalability. This approach provides more alternatives for data transmission, even under peak traffic conditions, thereby addressing scalability issues.
- Unique Network Model: A novel network model is proposed that optimizes performance by considering multiple attributes of network and signal quality, such as transmittance power, channel gain, and noise. This model aims to reduce latency and energy consumption while addressing scalability challenges.
- Simplified Consensus Mechanism: The proposed scheme includes a simplified finite field and robust key generation approach to enhance security without compromising performance. This covers a novel validation scheme and an innovative trust computation method.
4. Methodology
4.1. System Design
4.2. MS Operation Module
4.3. Validation of MS Identity
- Slave Node: This node is set to silently monitor the system’s actual states, followed by responding to the request from either the master node or the auxiliary node. Slave nodes refrain from participating in the election process of the master node directly; however, they can become auxiliary nodes if acknowledgment is not received from the master node after a certain period of timeout. The primary task of the slave node is to maintain sync with the master node by replicating its actions.
- Auxiliary Node: This node actively participates in transactions as a master node. The adopted consensus method [56] permits the selection of the master node based on arbitrary timeout instances. If the slave node does not hear from the master node within a specific cut-off time, the slave node changes to the auxiliary node state and initiates the election process. During the election process, the auxiliary node forwards requests from other nodes present within the system. If an auxiliary node receives votes in prominent numbers, it acts as a new master node.
- Master Node: The master node is primarily responsible for replica management associated with the log entries in the blockchain network. The master node processes requests generated from the client coordinates the complete consensus method, and transmits the updates to the slave nodes to retain the status of the master node. Notably, the master node is the pivotal contact point for the write operations in the Ethereum blockchain.
4.4. Network Model
4.5. Cost Modeling
5. Results
5.1. Assessment Environment
5.2. Accomplished Result
- Validation Time: This performance parameter represents the time required to validate the user’s request. This involves enrolling users, validating their identities, and computing the trust score. The aim is to determine the capability of the proposed system in terms of its responsiveness to process multiple requests from concurrent users in peak traffic situations. The outcome presented in Figure 6 eventually showed a faster validation time. The learning outcomes of this performance metric are as follows:
- °
- Novelty: The main novelty of this analysis is that the proposed system does not use any form of complex encryption (apart from hashing during validation of the sensor’s identity) to offer a faster validation time. This is not witnessed in existing approaches (Namane et al. [45], Li et al. [44], Lee et al. [43], and Hwaitat et al. [39]), where a complex form of encryption method was applied. This is unlikely in the majority of the existing approaches to blockchain. The secondary novelty of the analysis is associated with a simplified consensus method that allows the AP to interchange roles based on three entities (follower, auxiliary, and leader). The consensus methods in existing approaches perform quite a more extensive set of operations without defining the precise role of sensors, leading to increased validation times. Hence, the processing of such a consensus is faster and can accurately map the dynamic state of the network to facilitate an appropriate security action. Therefore, the proposed system is anticipated to exhibit faster responsiveness when exposed to real-time scenarios based on an extensive analysis of various traffic loads.
- °
- Evidential Justification: The existing approaches show that the implementation strategy is more inclined toward blockchain design than normalizing the communication model or enrollment process. For example, the validation times for Dong et al. [48] and Fu et al. [49] are expected to increase because of their dependency on the iterative training operation. Although these schemes can offer better security results, their validation times increase with an increase in the number of sensors and traffic. Similarly, approaches presented by Pajooh et al. [46] use big data approaches that can effectively offer better data quality towards effective resource management; however, the complex structure could easily offer sub-optimal scalability performance in the presence of a complex form of request or a higher amount of concurrent request processing. The approaches of Namane et al. [45], Li et al. [44], Lee et al. [43], and Hwaitat et al. [39] offer extensive encryption usage, which eventually increases the validation time. However, in contrast to existing schemes, the proposed model provides a novel synchronized design between the enrollment process and trust score calculation in the presence of both direct and indirect communication. This implies that the proposed scheme is capable of faster trust calculation without much dependency on the complexities of traffic or topological changes. Furthermore, the inclusion of state-based attributes in trust estimation assists in further considering all optimal possibilities of resource usage while performing data transmission between communicating mobile sensors. The lack of such inclusion in the design aspect of existing approaches proves the novel outcome generated by the proposed scheme.
- °
- Quantified Outcome: The proposed system offers an approximately 40% reduced validation time compared to the average validation time of existing blockchain-based approaches.
- Latency: This performance parameter is responsible for computing the latency between the transmitting and receiving nodes and involves processing the AP and GN during either the N2N or N2S mode of communication. The outcome shown in the previous section (Figure 7) exhibited a reduced latency in the proposed model. The learning outcomes of this part of the analysis are as follows:
- °
- Novelty: The primary novelty of this outcome is that the proposed scheme assigns channel capacity in the sequential form of mobile user demands. Such progressive allocation of resources has yet to be witnessed in the existing approaches discussed in the literature (Alam et al. [28], Feng et al. [38], Hwaitat et al. [39], and Thangaraj [47]). Simultaneously, the latency attribute is used to determine the cardinality of the allocated resources. This contributes to a progressive reduction in latency, even under peak traffic conditions. The secondary novelty of this outcome is that the proposed scheme can minimize the latency by adhering to the constraints considered while formulating the objective functions. This will eventually mean that the proposed modeling approach complies with the constraints to be satisfied by the objective function, leading to a greater likelihood of being functional over the real-time traffic of the sensor network. Hence, the reduced latency does not degrade the proposed system’s data quality or transmission rate, which must be addressed in existing related studies.
- °
- Evidential Justification: The proposed system completes the task related to data transmission within permissible latency, pl, by adopting optimal resources. Furthermore, the proposed model can perform both N2N and N2S concurrently, thereby contributing towards minimizing the latency, while the objective function constructed is compliant with the latency reduction phenomenon. However, this is different from the existing approaches. For example, the work of Alam et al. [28] has an extensive trust computation overlooking the latency demands of various tasks to resist varied forms of attack. Such a discrete form of task requirement was not considered. Other studies, such as Feng et al. [38], Hwaitat et al. [39], and Thangaraj [47], are characterized by various forms of internal operations related to the computation of security attributes. Although this complements blockchain security, it introduces significant latency when exposed to a highly distributed sensing environment. Similar trends have been reported in other studies.
- °
- Quantified Outcome: The proposed system offers approximately 28% reduced latency compared to the average latency of existing blockchain approaches.
- Throughput: This performance metric refers to the rate at which data are successfully transmitted from the source to the destination mobile sensor within the network (Figure 8). It measures the data transmitted over a network within a specified period. Throughput is influenced by various factors such as network topology, routing protocols, transmission power, interference, and data traffic patterns.
- °
- Novelty: The primary novelty of the proposed system is that it offers an unbiased balance between communication and optimal security performance. The choice of consensus method, as well as block size, has a potential influence on the throughput of WSNs. A closer look at the proposed scheme shows that the adopted consensus method used in the proposed scheme retains information about the computed trust scores from mobile sensors, where the consensus consists of reviewing requests from mobile sensors, forwarding of leader nodes, the response of mobile sensors, and replies made by the leader node. This offers a clear and precise voting process in adverse conditions (traffic or attack), leading to optimal throughput gains. This is a novel approach, whereas existing schemes use a stale consensus mechanism that could be more challenging to fine-tune when exposed to dynamic environments (especially in mobility). Hence, the proposed scheme will perform optimally towards resource management and data transmission when exposed to any form of adverse and challenging real-time environment with hardware constraints.
- °
- Evidential Justification: In the dynamic use case of a sensory application with mobility, where nodes typically have limited resources, such as battery power and processing capability, achieving high throughput while conserving energy is a crucial challenge. Efficient routing algorithms and protocols are often employed to optimize throughput and prolong the network’s lifetime. The proposed scheme contributes towards adjusting the transmission power of sensor nodes to help maximize the communication range and reduce interference, leading to better throughput. The mobile sensors can dynamically change their transmission power based on the distance to the destination and signal strength. The proposed scheme uses multiple channels to mitigate interference and improve the network throughput. Finally, implementing QoS mechanisms allows the network to prioritize certain types of traffic based on their importance and urgency. By allocating resources efficiently and ensuring the timely delivery of critical data, QoS mechanisms can enhance the throughput in WSNs. However, none of the existing approaches [38,39,40,41,42,43,44,45,46,47] use sophisticated operations that are mainly witnessed to adopt any such process and hence witnessed with reduced throughput.
- °
- Quantified Outcome: The proposed system achieved an enhanced throughput of approximately 23% compared with existing approaches.
- Overhead: This performance metric refers to any additional data or control information transmitted or required beyond the actual payload data (Figure 9). This information is necessary for network management, communication protocols, error detection and correction, and other administrative purposes. Overhead can significantly impact the network’s performance and efficiency, as it consumes bandwidth, energy, and computational resources. The proposed system computes the control overhead among the various types of overhead. Control messages are used for synchronization, neighbor discovery, channel allocation, and other management functions within the network. These messages help maintain the integrity and reliability of the communication process but add overhead to the data transmission.
- °
- Novelty: A closer look at the overhead outcome shows that it is much better, even in contrast to the other previously assessed performance metrics in the proposed analysis. This is because of the novel features introduced in the proposed system associated with the redistribution and reassignment of resources. When any mobile sensor is assigned a surplus resource, the surplus resources are autonomously assigned to other needy mobile users, which is not observed in the existing approaches [38,39,40,41,42,43,44,45,46,47]. This phenomenon leads to a fair redistribution of resources, reducing the possibilities of fluctuating network size, network density, and a higher degree of topology changes.
- °
- Evidential Justification: In densely populated simulation areas, the control overhead increases because of the significant number of neighboring nodes and the frequency of route discovery and maintenance messages. Sparse networks may have lower control overhead but may suffer from longer route establishment times. This problem is addressed in the proposed system by adopting a network model based on a novel cost modeling that controls the network’s density. This characteristic is not observed in existing approaches [38,39,40,41,42,43,44,45,46,47], which have the least control over overhead increments. In addition, dynamic network conditions, such as node mobility or failures, can trigger frequent topology changes, leading to an increased control overhead. The proposed system is a network model that can adapt to these changes by updating the data dissemination information and recalculating paths, thereby contributing to reduced control message transmission. Furthermore, in the existing system, the transmission range of the sensor nodes affects the frequency of neighbor discovery and synchronization messages. Nodes within range of each other must exchange control messages to establish and maintain links, leading to a higher control overhead in networks with more extensive transmission ranges. It is also deemed that the existing approaches [38,39,40,41,42,43,44,45,46,47] use stringent QoS requirements and may require more frequent control message exchanges to maintain the desired performance levels, leading to a higher control overhead.
- °
- Quantified Outcome: The proposed system contributes to an overhead reduction of approximately 38% compared with existing approaches.
- Cost: This is another significant performance metric for establishing a cost-effective model. The computation of this metric is carried out by considering all possible networks and computation-based resources used to transmit data successfully. The network resources include channel capacity, whereas computational resources include the assigned energy/power resources. The learning outcomes of this performance metric, as shown in Figure 10, are as follows:
- °
- Novelty: The core novelty of the proposed outcome is that it computes the cost following the user’s payment of the cost of using the services, unlike any reported schemes in the literature (e.g., Hwaitat et al. [39], Dong et al. [48], Awan et al. [29]). The novelty of this scheme is that when the saturation rate of the server resources is higher, the resource unit price will also be higher. This optimal cost prompts the user to select resources using N2N or N2S modes of communication. Hence, if the utilization of resources is higher, it can contribute towards minimizing the possibilities of bottleneck conditions in the network. Therefore, the proposed system contributes to both QoS and experience.
- °
- Evidential Justification: A closer look at existing approaches shows various dedicated efforts to comply with cost-effective outcomes. The cost-effectiveness of Hwaitat et al. [39] is associated with the optimal execution time of the blocks and multiparty signatures. Dong et al. [48] used machine learning to minimize costs, whereas Awan et al. [29] used blockchain to minimize operational costs. However, there is still a loophole in these cost computation processes, as these models can perform cost computations but cannot contribute to proactive cost reduction. This loophole is potentially addressed in the proposed system, where novel and distinct cost modeling is carried out that computes the cost over multiple scenarios and significantly reduces the cost.
- °
- Quantified Outcome: The proposed scheme offers an approximately 27% reduction in cost compared to existing approaches.
- Processing Time: The proposed system’s final performance parameter focuses on analyzing the models’ computational efficiency performance. This performance metric was computed by recording the overall time required by the model to start and finish its operations. The learning outcomes of the model, shown in Figure 11, are as follows:
- °
- Novelty: The proposed scheme offers a unique cost model in which one objective function complies with seven constraints to ensure optimal resource utilization. The compliance standard toward satisfying constraints is much higher than that of any existing approach (Alam et al. [28], Awan et al. [29], Ding et al. [37], Feng et al. [38]). The existing system must assess its adherence to a broader consideration of constraints. This scheme reduces operational costs and potential resistance to illegitimate activities within the network. Hence, the proposed scheme presents a proper equilibrium between secure blockchain operations and data transmission with optimal resource management. This phenomenon is suitable for supporting secure data transmission in WSNs or any large-scale distributed networks in the presence of mobility, considering emergencies and standard applications hosted on it.
- °
- Evidential Justification: Reducing the computational complexity of blockchains in sensor networks is crucial for ensuring scalability and efficiency. The proposed scheme uses a simplified consensus mechanism that minimizes the computational overhead. The proposed scheme also aggregates the sensor data at the edge before sending them to the blockchain at the AP. This reduces the volume of data transmitted and processed on the blockchain, lowering computational complexity. Finally, the proposed system uses a cache that frequently accesses the data or computation results to reduce redundant calculations. The scheme stores the previously computed results, avoiding recomputation when the same inputs occur again, thus decreasing the overall computational complexity and reducing the processing time. However, the processing time for existing systems (Alam et al. [28], Awan et al. [29], Ding et al. [37], Feng et al. [38]) uses complex forms of blockchain operations. Simultaneously, some existing approaches (e.g., Dong et al. [48], Fu et al. [49]) tend to use highly iterative internal operations towards accomplishing their security targets.
- °
- Quantified Outcome: The processing time of the proposed system was found to offer approximately 38% of the reduced score, in contrast to existing approaches.
- Without adopting any complex cryptographic approach, unlike the frequently used methods in existing studies, the proposed scheme offers a significant reduction in validation time by 40% in dynamic scenarios. Hence, the supportability for scalable performance in the proposed blockchain is highly ensured for near-world services in IoT, unlike existing approaches.
- The latency performance is improved by 28% in the proposed system, which can be attributed to its mechanism to handle optimal resources right from the consensus mechanism until the final stage of assessing the constraint adherence of the model. This is an unconventionally novel outcome, as existing systems are mainly reported to undertake extensive internal security operations without any latency compensation schemes in dynamic environments.
- The data transmission performance was improved by a 23% increase in throughput and a 38% reduction in overhead. The prime novelty of this outcome is associated with the symmetric network dynamics of the proposed consensus methods that balance both resource demands and security demands, unlike methods reported in the literature with unfair resource distribution during the consensus mechanism.
- The presented scheme also offers a 27% reduction in cost along with a 38% faster responsiveness, proving this score as a high accomplishment to date in contrast to existing methods of blockchain operations.
6. Conclusions and Outlook
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Suyatna, I.P.; Mohamed, Y.H.; Abbas, M.S.; Ismail, A.F.; Magiman, M.M.; Yunus, Y. The Emergence and Challenges of Blockchain Technology in Business and IoT Applications. In Proceedings of the 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 12–13 May 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Anwar, F.; Khan, B.U.I.; Kiah, L.B.M.; Abdullah, N.A.; Goh, K.W. A Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 878–890. [Google Scholar] [CrossRef]
- Khan, B.U.I.; Goh, K.W.; Mir, M.S.; Mohd Rosely, N.F.L.; Mir, A.A.; Chaimanee, M. Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions. Information 2024, 15, 212. [Google Scholar] [CrossRef]
- Xu, D.; Gao, Y.; Xiao, X. Precision Poverty Alleviation Methods in the Agricultural Field Based Upon Wireless Communication Networks and Blockchain. Wirel. Commun. Mob. Comput. 2022, 2022, 2687445. [Google Scholar] [CrossRef]
- Leelakrishnan, S.; Chakrapani, A. Power Optimization in Wireless Sensor Network Using VLSI Technique on FPGA Platform. Neural Process. Lett. 2024, 56, 125. [Google Scholar] [CrossRef]
- Abidoye, A.P.; Kabaso, B. Energy-Efficient Hierarchical Routing in Wireless Sensor Networks Based on Fog Computing. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 8. [Google Scholar] [CrossRef]
- Liang, D.; Shen, H.; Chen, L. Maximum Target Coverage Problem in Mobile Wireless Sensor Networks. Sensors 2020, 21, 184. [Google Scholar] [CrossRef]
- Ullah, A.; Khan, F.S.; Mohy-ud-din, Z.; Hassany, N.; Gul, J.Z.; Khan, M.; Kim, W.Y.; Park, Y.C.; Rehman, M.M. A Hybrid Approach for Energy Consumption and Improvement in Sensor Network Lifespan in Wireless Sensor Networks. Sensors 2024, 24, 1353. [Google Scholar] [CrossRef]
- Haq, M.Z.U.; Khan, M.Z.; Rehman, H.U.; Mehmood, G.; Binmahfoudh, A.; Krichen, M.; Alroobaea, R. An Adaptive Topology Management Scheme to Maintain Network Connectivity in Wireless Sensor Networks. Sensors 2022, 22, 2855. [Google Scholar] [CrossRef]
- Vellaichamy, J.; Basheer, S.; Bai, P.S.M.; Khan, M.; Kumar Mathivanan, S.; Jayagopal, P.; Babu, J.C. Wireless Sensor Networks Based on Multi-Criteria Clustering and Optimal Bio-Inspired Algorithm for Energy-Efficient Routing. Appl. Sci. 2023, 13, 2801. [Google Scholar] [CrossRef]
- Erskine, S.K. Secure Data Aggregation Using Authentication and Authorization for Privacy Preservation in Wireless Sensor Networks. Sensors 2024, 24, 2090. [Google Scholar] [CrossRef]
- Biswas, K.; Chowdhury, M.J.M.; Usman, M. Blockchain of Things: Benefits, Challenges and Future Directions. Sensors 2024, 24, 934. [Google Scholar] [CrossRef]
- Nazir, H.; Fan, J. Revolutionizing Retail: Examining the Influence of Blockchain-Enabled IoT Capabilities on Sustainable Firm Performance. Sustainability 2024, 16, 3534. [Google Scholar] [CrossRef]
- Alam, T. Blockchain-Based Internet of Things: Review, Current Trends, Applications, and Future Challenges. Computers 2022, 12, 6. [Google Scholar] [CrossRef]
- Manzoor, R.; Sahay, B.S.; Singh, S.K. Blockchain Technology in Supply Chain Management: An Organizational Theoretic Overview and Research Agenda. Ann. Oper. Res. 2022. [Google Scholar] [CrossRef]
- Singh, K.; Singha, N. Credit-Based Energy Trading System Using Blockchain and Machine Learning. J. Supercomput. 2024, 80, 15386–15407. [Google Scholar] [CrossRef]
- Kumar, B.C.G.; Harsha, K.G.; Mahesh, G.; Shukla, V.; Talari, S. BBIWMS: A Secure Blockchain-Based Framework for Integrated Water Management System for Smart City. In Cryptology and Network Security with Machine Learning; Springer Nature Singapore: Singapore, 2024; pp. 157–168. ISBN 9789819922284. [Google Scholar]
- Sambare, S.S.; Khandait, K.; Kolage, K.; Kolambe, K.; Nimbalkar, T. Literature Review on Waste Management Using Blockchain. In Proceedings of International Conference on Data Science and Applications; Springer Nature Singapore: Singapore, 2023; pp. 495–510. ISBN 9789811966309. [Google Scholar]
- Chiaraluce, G.; Bentivoglio, D.; Finco, A.; Fiore, M.; Contò, F.; Galati, A. Exploring the Role of Blockchain Technology in Modern High-Value Food Supply Chains: Global Trends and Future Research Directions. Agric. Food Econ. 2024, 12, 6. [Google Scholar] [CrossRef]
- Calvão, F.; Archer, M. Digital Extraction: Blockchain Traceability in Mineral Supply Chains. Polit. Geogr. 2021, 87, 102381. [Google Scholar] [CrossRef]
- Petracci, R.; Culmone, R.; Mostarda, L. Blockchain Application for Fish Origin Certification. In Advances on Broad-Band and Wireless Computing, Communication and Applications; Springer Nature Switzerland: Cham, Switzerland, 2024; pp. 149–158. ISBN 9783031467837. [Google Scholar]
- Zhu, G.; He, D.; An, H.; Luo, M.; Peng, C. The Governance Technology for Blockchain Systems: A Survey. Front. Comput. Sci. 2024, 18, 182813. [Google Scholar] [CrossRef]
- Buttar, A.M.; Shahid, M.A.; Arshad, M.N.; Akbar, M.A. Decentralized Identity Management Using Blockchain Technology: Challenges and Solutions. In Blockchain Transformations; Springer Nature Switzerland: Cham, Switzerland, 2024; pp. 131–166. ISBN 9783031495922. [Google Scholar]
- Upadrista, V.; Nazir, S.; Tianfield, H. Secure Data Sharing with Blockchain for Remote Health Monitoring Applications: A Review. J. Reliab. Intell. Environ. 2023, 9, 349–368. [Google Scholar] [CrossRef]
- Altulyan, M.; Yao, L.; Kanhere, S.; Huang, C. A Blockchain Framework Data Integrity Enhanced Recommender System. Comput. Intell. 2023, 39, 104–120. [Google Scholar] [CrossRef]
- Tian, Y.; Lu, Z.; Adriaens, P.; Minchin, R.E.; Caithness, A.; Woo, J. Finance Infrastructure through Blockchain-Based Tokenization. Front. Eng. Manag. 2020, 7, 485–499. [Google Scholar] [CrossRef]
- Sober, M.; Scaffino, G.; Schulte, S.; Kanhere, S.S. A Blockchain-Based IoT Data Marketplace. Clust. Comput. 2023, 26, 3523–3545. [Google Scholar] [CrossRef]
- Alam, S.; Zardari, S.; Shamsi, J.A. Blockchain-Based Trust and Reputation Management in SIoT. Electronics 2022, 11, 3871. [Google Scholar] [CrossRef]
- Awan, S.; Javaid, N.; Ullah, S.; Khan, A.U.; Qamar, A.M.; Choi, J.-G. Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks. Sensors 2022, 22, 411. [Google Scholar] [CrossRef] [PubMed]
- Liang, Y.-C. Blockchain for Dynamic Spectrum Management. In Dynamic Spectrum Management; Springer Singapore: Singapore, 2020; pp. 121–146. ISBN 9789811507755. [Google Scholar]
- Latif, R.; Yakubu, B.M.; Saba, T. MarketTrust: Blockchain-Based Trust Evaluation Model for SIoT-Based Smart Marketplaces. Sci. Rep. 2023, 13, 11571. [Google Scholar] [CrossRef]
- Al-Rakhami, M.S.; Al-Mashari, M. A Blockchain-Based Trust Model for the Internet of Things Supply Chain Management. Sensors 2021, 21, 1759. [Google Scholar] [CrossRef]
- Arshad, Q.-U.-A.; Khan, W.Z.; Azam, F.; Khan, M.K.; Yu, H.; Zikria, Y.B. Blockchain-Based Decentralized Trust Management in IoT: Systems, Requirements and Challenges. Complex Intell. Syst. 2023, 9, 6155–6176. [Google Scholar] [CrossRef]
- Bellaj, B.; Ouaddah, A.; Bertin, E.; Crespi, N.; Mezrioui, A.; Bellaj, K. BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing. J. Netw. Syst. Manag. 2022, 30, 64. [Google Scholar] [CrossRef]
- Masmoudi, M.; Zayani, C.A.; Amous, I.; Sèdes, F. A New Blockchain-Based Trust Management Model. Procedia Comput. Sci. 2021, 192, 1081–1091. [Google Scholar] [CrossRef]
- Javaid, N. A Secure and Efficient Trust Model for Wireless Sensor IoTs Using Blockchain. IEEE Access 2022, 10, 4568–4579. [Google Scholar] [CrossRef]
- Ding, J.; Han, L.; Li, J.; Zhang, D. Resource Allocation Strategy for Blockchain-Enabled NOMA-Based MEC Networks. J. Cloud Comput. Adv. Syst. Appl. 2023, 12, 142. [Google Scholar] [CrossRef]
- Feng, Y.; Zhong, Z.; Sun, X.; Wang, L.; Lu, Y.; Zhu, Y. Blockchain Enabled Zero Trust Based Authentication Scheme for Railway Communication Networks. J. Cloud Comput. Adv. Syst. Appl. 2023, 12, 62. [Google Scholar] [CrossRef]
- Al Hwaitat, A.K.; Almaiah, M.A.; Ali, A.; Al-Otaibi, S.; Shishakly, R.; Lutfi, A.; Alrawad, M. A New Blockchain-Based Authentication Framework for Secure IoT Networks. Electronics 2023, 12, 3618. [Google Scholar] [CrossRef]
- Amjad, S.; Abbas, S.; Abubaker, Z.; Alsharif, M.H.; Jahid, A.; Javaid, N. Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things. Sensors 2022, 22, 1972. [Google Scholar] [CrossRef] [PubMed]
- Dwivedi, S.K.; Amin, R.; Vollala, S. Design of Secured Blockchain Based Decentralized Authentication Protocol for Sensor Networks with Auditing and Accountability. Comput. Commun. 2023, 197, 124–140. [Google Scholar] [CrossRef]
- Chen, Y.; Yang, X.; Li, T.; Ren, Y.; Long, Y. A Blockchain-Empowered Authentication Scheme for Worm Detection in Wireless Sensor Network. Digit. Commun. Netw. 2022, 10, 265–272. [Google Scholar] [CrossRef]
- Lee, Y.; Rathore, S.; Park, J.H.; Park, J.H. A Blockchain-Based Smart Home Gateway Architecture for Preventing Data Forgery. Hum.-centric Comput. Inf. Sci. 2020, 10, 9. [Google Scholar] [CrossRef]
- Li, C.; Chen, Q.; Chen, M.; Su, Z.; Ding, Y.; Lan, D.; Taherkordi, A. Blockchain Enabled Task Offloading Based on Edge Cooperation in the Digital Twin Vehicular Edge Network. J. Cloud Comput. Adv. Syst. Appl. 2023, 12, 120. [Google Scholar] [CrossRef]
- Namane, S.; Ben Dhaou, I. Blockchain-Based Access Control Techniques for IoT Applications. Electronics 2022, 11, 2225. [Google Scholar] [CrossRef]
- Honar Pajooh, H.; Rashid, M.A.; Alam, F.; Demidenko, S. IoT Big Data Provenance Scheme Using Blockchain on Hadoop Ecosystem. J. Big Data 2021, 8, 114. [Google Scholar] [CrossRef]
- Thangaraj, V.; Raja Sree, T. MSCO: Mobility-Aware Secure Computation Offloading in Blockchain-Enabled Fog Computing Environments. J. Cloud Comput. Adv. Syst. Appl. 2024, 13, 88. [Google Scholar] [CrossRef]
- Dong, Z.; Liang, W.; Liang, Y.; Gao, W.; Lu, Y. Blockchained Supply Chain Management Based on IoT Tracking and Machine Learning. EURASIP J. Wirel. Commun. Netw. 2022, 2022, 127. [Google Scholar] [CrossRef] [PubMed]
- Fu, X.; Peng, R.; Yuan, W.; Ding, T.; Zhang, Z.; Yu, P.; Kadoch, M. Federated Learning-Based Resource Management with Blockchain Trust Assurance in Smart IoT. Electronics 2023, 12, 1034. [Google Scholar] [CrossRef]
- Rathod, T.; Jadav, N.K.; Tanwar, S.; Polkowski, Z.; Yamsani, N.; Sharma, R.; Alqahtani, F.; Gafar, A. AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure. Sensors 2023, 23, 8928. [Google Scholar] [CrossRef] [PubMed]
- Charles, V.; Emrouznejad, A.; Gherman, T. A Critical Analysis of the Integration of Blockchain and Artificial Intelligence for Supply Chain. Ann. Oper. Res. 2023, 327, 7–47. [Google Scholar] [CrossRef]
- Farooq, M.S.; Khan, S.; Rehman, A.; Abbas, S.; Khan, M.A.; Hwang, S.O. Blockchain-Based Smart Home Networks Security Empowered with Fused Machine Learning. Sensors 2022, 22, 4522. [Google Scholar] [CrossRef]
- Ismail, S.; Nouman, M.; Dawoud, D.W.; Reza, H. Towards a Lightweight Security Framework Using Blockchain and Machine Learning. Blockchain Res. Appl. 2024, 5, 100174. [Google Scholar] [CrossRef]
- Faheem, M.; Raza, B.; Bhutta, M.S.; Madni, S.H.H. A blockchain-based resilient and secure framework for events monitoring and control in distributed renewable energy systems. IET Blockchainpage 2024, 1–15. [Google Scholar] [CrossRef]
- Gaur, A.K.; Valan, J.A. Impact of Security in Blockchain Based Real Time Applications. In Computational Intelligence in Pattern Recognition; Springer Nature Singapore: Singapore, 2022; pp. 193–200. ISBN 9789811930881. [Google Scholar]
- Fu, W.; Wei, X.; Tong, S. An Improved Blockchain Consensus Algorithm Based on Raft. Arab. J. Sci. Eng. 2021, 46, 8137–8149. [Google Scholar] [CrossRef]
Authors | Problem | Methods | Benefits | Limitation |
---|---|---|---|---|
Alam et al. [28] | Trust management in SIoT (Social Internet of Things) | Trust monitoring-based model integrated with blockchain | Resistant to certain trust-based attacks; enhanced trustworthiness in SIoT environments | Limited protection against complex cyber threats; scalability concerns |
Awan et al. [29] | Node authentication in WSNs | Asymmetric encryption keys, trust evaluation model for energy-aware security | Reduced energy consumption; adaptable to various IoT scenarios | Higher memory dependency limits scalability in resource-constrained environments |
Latif et al. [31] | Selection of trusted resources in smart marketplaces | Blockchain-based trust evaluation model | Significant reduction in latency; improved transaction efficiency | Inability to detect complex threat patterns, which may affect long-term reliability |
Al-Rakhami [32], Arshad et al. [33], Bellaj et al. [34], Masmoudi et al. [35], and Javaid et al. [36] | Trust management in supply chain IoT | Blockchain-based trust management design | Simplified implementation; enhances transparency and security in supply chains | Resource-intensive, leading to potential inefficiencies in large-scale deployments |
Ding et al. [37] | Proof-of-Work in Wireless Networks | Non-orthogonal multiple access (NOMA) combined with blockchain | Significant energy savings; improved network throughput | Less resilient to advanced persistent threats and DDoS attacks |
Feng et al. [38] | Complex network structure and identity management | Identity storage via blockchain and Merkle tree, two-way authentication | Strengthens storage security; resists both internal and external attacks | Specific to particular network systems; lacks generalizability across different architectures |
Hwaitat et al. [39] | Privacy and trust in IoT networks | Permission-based blockchain with homomorphic encryption | Optimizes data storage and retrieval; improves privacy in IoT data exchanges | Non-scalable performance; challenges in adapting to rapidly growing networks |
Amjad et al. [40], Dwivedi et al. [41], and Chen et al. [42] | Node authentication in IoT | Blockchain-based authentication schemes | Resists predefined attack scenarios; enhances security in sensor networks | Design not optimized for dynamic threat patterns; may struggle with evolving security challenges |
Lee et al. [43] | Blockchain-enabled smart home gateway architecture | High accuracy and fast response time; prevents data forgery | High resource consumption, particularly in large-scale networks with multiple nodes | Blockchain-enabled smart home gateway architecture |
Li et al. [44] | Task offloading efficiency in vehicular networks | Blockchain and bio-inspired algorithms for task offloading | Minimizes network cost; reduces latency in edge computing | Limited resistance to cyber threats; potential security vulnerabilities |
Pajooh et al. [46] | IoT data security and storage | Hyperledger fabric blockchain with decentralized storage | Faster response time; reduced CPU consumption; efficient data management | Sub-optimal latency performance in high-demand scenarios |
Thangaraj and Sree [47] | Task offloading for mobile users | Offloading mechanism using search optimization and genetic algorithms | Reduces latency and energy consumption by 11%; improves offloading efficiency | Lacks resilience against dynamic cyber threats; security concerns remain |
Dong et al. [48] | Predictive supply chain management | Blockchain and attention-based gated recurrent units | Better predictive accuracy; enhanced supply chain management | Higher resource utilization, which may affect system scalability |
Fu et al. [49] | Resource management in IoT | Federated learning combined with blockchain and SVM | Acceptable identification accuracy; decentralized management | Non-scalable performance; challenges with large-scale IoT deployments |
Rathod et al. [50], Charles et al. [51], Farooq et al. [52], and Ismail et al. [53] | Blockchain security in critical infrastructures | Machine learning approaches integrated with blockchain | Effective predictive accuracy in threat detection | Higher response time; potential inefficiencies in real-time operations |
Faheem et al. [54] | Event control in smart grids | Parallel Proof-of-Stake mechanism and secure routing | Can sustain operations under cyberattack scenarios; ensures reliable event monitoring | Resource-inefficient for massive data transmission; challenges with real-time processing |
Notation | Meaning |
---|---|
Φ | Density of sensors |
s | Number of N2N mobile users |
t | timeslots |
Tr/Re | Transmitting/Receiving nodes |
α | transmission criticality coefficient |
ds | data size |
pl | permissible latency of transmission |
iden | Identity |
arb | Arbitrary value |
sc | security certificate |
Ω | generation of security method |
(p, q) | Non-negative integer |
pr | Prime number |
At | Timestamp |
pub/priv | Public/private key |
π | Arbitrary number generated by gateway node |
incog | Incognito coefficient |
tr | Trust score |
sig | Signature |
sj/so | Source sensor/target sensor |
Qsig | Signal quality |
d1/d2 | durations required for the N2N and N2S communication modes |
Co | Cost |
χ | channel capacity size |
ψ | change in the unit price |
in | instantaneous channel capacity |
Ofun | Objective function |
Parameter | Values |
---|---|
Area of simulation | 900 × 1100 m2 |
No. of Mobile Sensors | 500 |
Velocity of Mobile Sensors (Variable) | 5–10 m/s |
Transmittance power | 15 dBm |
Block size | 2000 kilobytes |
Channel capacity of mobile sensor | 1000 bps |
Channel capacity of AP | 2000 bps |
Channel capacity of GN | 4000 bps |
Initialized energy for Sensors | 10 J |
Energy assigned to transmit 1 byte of data | 50 nj |
Approaches | Validation Time (s) | Latency (s) | Throughput (bps) | Overhead (bps) | Cost | Processing Time (s) |
---|---|---|---|---|---|---|
Alam et al. [28] | 0.5887 | 0.4221 | 1788 | 4350 | 0.6278 | 0.6118 |
Awan et al. [29] | 0.7021 | 0.2847 | 2670 | 4989 | 0.6893 | 0.6773 |
Ding et al. [37] | 0.6098 | 0.17882 | 1987 | 5610 | 0.5995 | 0.5982 |
Dong et al. [48] | 0.7276 | 0.4782 | 2900 | 3599 | 0.6833 | 0.5289 |
Feng et al. [38] | 0.5692 | 0.1982 | 2550 | 4705 | 0.7621 | 0.5974 |
Fu et al. [49] | 0.7445 | 0.387 | 1721 | 4691 | 0.5932 | 0.7964 |
Hwaitat et al. [39] | 0.631 | 0.2109 | 2600 | 6920 | 0.5885 | 0.6983 |
Lee et al. [43] | 0.6933 | 0.4835 | 1950 | 4555 | 0.7402 | 0.7451 |
Li et al. [44] | 0.5991 | 0.1769 | 2250 | 4985 | 0.6298 | 0.6502 |
Namane et al. [45] | 0.7109 | 0.2976 | 1871 | 5370 | 0.6002 | 0.7864 |
Pajooh et al. [46] | 0.7305 | 0.3501 | 1900 | 4130 | 0.7631 | 0.7582 |
Thangaraj et al. [47] | 0.6831 | 0.3201 | 2100 | 6301 | 0.5831 | 0.6903 |
Proposed | 0.2668 | 0.0378 | 4500 | 1200 | 0.388 | 0.2985 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, B.U.I.; Goh, K.W.; Khan, A.R.; Zuhairi, M.F.; Chaimanee, M. Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain. Symmetry 2025, 17, 61. https://doi.org/10.3390/sym17010061
Khan BUI, Goh KW, Khan AR, Zuhairi MF, Chaimanee M. Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain. Symmetry. 2025; 17(1):61. https://doi.org/10.3390/sym17010061
Chicago/Turabian StyleKhan, Burhan Ul Islam, Khang Wen Goh, Abdul Raouf Khan, Megat F. Zuhairi, and Mesith Chaimanee. 2025. "Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain" Symmetry 17, no. 1: 61. https://doi.org/10.3390/sym17010061
APA StyleKhan, B. U. I., Goh, K. W., Khan, A. R., Zuhairi, M. F., & Chaimanee, M. (2025). Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain. Symmetry, 17(1), 61. https://doi.org/10.3390/sym17010061