Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

A Novel Blockchain Secure to Routing Protocol in WSN

2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR) | 978-1-6654-4005-9/20/$31.00 ©2021 IEEE | DOI: 10.1109/HPSR52026.2021.9481805

Wassim Jerbi Omar cheikhrouhou Abderrahmen Guermazi


CES Laboratory, ENIS, University of CES Laboratory, ENIS, University of CES Laboratory, ENIS, University of
Sfax, Sfax 3038, Tunisia, Higher Institute Sfax, Sfax 3038, Tunisia. Sfax, Sfax 3038, Tunisia, Higher Institute
of Technological Studies Sfax cheichrouhou@gmail.com of Technological Studies Sfax
Wassim.jerbi@isetn.rnu.tn abguermazi@gmail.com

Atef Boubaker Hafedh Trabelsi


Higher Institute of Technological Studies CES_Lab research, National School of
Sfax, Tunisia Engineering Sfax, University of Sfax,
atef.boubaker@isetsf.rnu.tn Hafedh.trabelsi@enis.rnu.tn

Abstract— A blockchain is a database that contains the different technologies. It encompasses almost all current
history of all exchanges made between its users since its Information Technology (IT) fields such as smart cities,
creation. A blockchain is a distributed and secure ledger of all Machine to Machine, connected vehicles, Wireless Sensor
transactions made since the start of the distributed system. It Networks (WSN), etc, and uses other cutting-edge
is a technology for storing and transmitting information,
technologies such as Cloud Computing, Big Data, or even
transparent, secure, and operating without a central control
the blockchains.
body. Our paper studies a new device authentication for mobile
sensor node to prove its authenticity to unknown network The contribution of this paper is as follows:
manager. To solve the authentication of sensor among multiple • Connected devices are generally very limited in
networks, our proposal a blockchain scheme where the terms of computation and storage capacity.
transaction specifies the authentication of given cluster head • Lighten the work of currencies by fairly simple and
CH. As we claim, a blockchain guarantees an integrity and robust authentication mechanism.
availability of message under assumption that every node has • Reduce the calculation time and the number of
some public and private key pairs. However, it does not provide
messages between the device and the BS by
any authentication mechanism for symmetric key. Hence, the
proposed scheme is secure as we claim. More concretely, in the
consulting the history of the blockchain.
protocol proposed Blockchain Security IoT (BSI) is to provide • Ensure the authentication of the BS Mobile with
authentication between the mobile base station (BS), the cluster CH.
head and the member nodes for wireless sensor networks • Provide an authentication mechanism allowing the
(WSN). Our protocol BSI protocol makes it possible to put the migration of nodes from one cluster to another.
necessary keys of the networks at the level of each sensor for
the different scenarios carried out, BS mobile node and II. RELATED WORKS
migration node. We evaluate the performance of our protocol
with simulations using MATLAB. The results confirm that the
To route information through the network, the routing
BSI protocol is robust and efficient, provides lower power protocol establishes routes, so that sensors can relay
consumption and fast computing time. information to and from the network edge router through
reliable links and leading to the network destination through
Keywords- Wireless Sensor Networks; Internet of Things; short paths.
Routing Protocol; Security; Blockchain; Authentication.
The authors in [1 -5] present the areas of blockchain-based
I. Introduction IoT privacy and security, and [6] present specific
discussions for blockchain-based IoT solutions and the
The Internet of Things (IoT) is a major part of our daily life
challenges involved, also present a review of recent research
today. Billions of intelligent and autonomous objects around
on holistic decentralization of IoT via blockchains. The
the world are connected and communicate with each other.
authors in [7] present recent research efforts for different
The IoT is the result of the development and combination of
fields of application such as smart city, smart grids, etc. The

978-1-6654-4005-9/21/$31.00 ©2021 IEEE

Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on January 18,2022 at 04:10:12 UTC from IEEE Xplore. Restrictions apply.
authors [8] present a survey dealing with the different objects. In addition, it limits the mobility of nodes by a
architectures for integrating blockchains into the IoT. preconfigured number of possible clusters and networks.
The authors [9] show an in-depth study of the principles of When adding nodes, a new network appears, so you have to
networking involved in publicly distributed blockchains, update the node with the key corresponding to this new
including potential attacks and design compromises. They network. So, to overcome this problem, we must design a
also present the need for formal models to address design decentralized authentication system, transparent and
tradeoffs when implementing public blockchains. Authors' scalable, which does not negatively impact the performance
contributions are interested in blockchain taxonomy and of objects or that of clusters and new networks. This system
decentralized consensus [10, 14] and challenges, research must provide complete freedom to move from one node to
direction for blockchain for IoT [15-27]. another cluster and also from one network to another, as long
When designing our approach, we first produced a first as one is working in a heterogeneous network, to ensure the
version that allows authentication of a device during the security of the latter [39- 42].
association phase. The authentication mechanism used is
based on the One Time Password (OTP), a one-time 3.1 Mobile nodes in different networks:
password, defined in RFC 2289 [28] and RFC 4226 [29], as In the first case, more and more applications will require the
well as on the challenge / response principle described by presence of sensors on moving parts. The interest of
RFC1994 [30]. Indeed, an OTP is a password that is only mobility in wireless sensor networks is multiple insofar as
valid during a single authentication operation. The reason mobile sensors can extend the coverage of a network or even
why, it represents a very resistant authentication mechanism obtain more precise results. These mobile nodes can be used
against replay attacks and cryptanalysis attacks [31]. in applications such as animal monitoring.
The authors propose Crypto-ECC, a new secure routing The security of sensor mobility is absent in most of the
protocol for generating and managing cryptographic keys protocols proposed in the literature. Indeed, if a sensor Si
for wireless sensor networks deployed in the Internet of belonging to a cluster X managed by CH wants to move to
Things, which consists of accelerate calculations based on another network managed by cluster Y, then Si will not be
the parallelism [32]. This is because a calculation task is able to authenticate and join the network of cluster Y
divided into several independent parts, which can be because it does not have not the correct key, show in figure
processed at the same time by different member nodes. The 1.
protocol saves a lot of computation time with reduced power
consumption [33-34]. Cluster X Cluster Y

III. Proposed protocol BSI


Mobility
We are going to propose a decentralized authentication
mechanism, based on blockchains that allows the secure
mobility of objects and to have a global view on the different
networks. Most protocols provide basic security services.
Our proposed protocol BSI can handle:
Mobile nodes: a base station (BS) that move from Figure 1. Mobility of sensors
one cluster or networks to another for the collection
of cluster head (CH) data The base station is responsible for collecting data directly
Node migration: each round, a new cluster from static nodes. The CH wait for a mobile device to pass
formation with new nodes, clustering-based by to send their messages to it so that communication takes
protocols like LEACH [35], HEED [36], TL- place nearby (directly or at most with a limited number of
LEACH [37], O-LEACH reference protocol [38]. hops). Therefore, the CH can save energy because path
length, contention and diffusion overheads are reduced. In
One of the solutions that can be carried out is to put the keys addition, the mobile device can visit the network in order to
of the n clusters at the level of each mobile node, so that the evenly distribute the energy consumption among the
latter can authenticate and associate with these n clusters and different CHs at the time of communication (CH away from
m networks, using the appropriate key. However, this BS).
solution is not optimal because it saturates the memory of

Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on January 18,2022 at 04:10:12 UTC from IEEE Xplore. Restrictions apply.
3.2 Nodes migration one node from one cluster to another
The blockchain guarantees the integrity, reliability and in the same network
availability of the information stored. We have a sensor Si In the second case, the clustering technique allows the
belonging to the network managed by cluster X. The first network to be divided into sets of locally close nodes.
secure associations of Si with cluster X and takes place as However, it presents an effective solution to facilitate and
explained in figure 2. reduce network functions and services. In addition, it allows
. Once the sensor is authenticated, the network X sends a the routing protocol to operate more efficiently by reducing
transaction, signed by its private key, to the blockchain with power consumption in the network. Many clustering
the information "CHX: Si_Authentication", which means algorithms have been developed and evaluated. These
that the CHX network is the guarantor that Si is trusted, and algorithms have different parameters and metrics and are all
that CHX has the symmetric keys of Si. This transaction is designed to meet certain goals (routing, coverage, energy
stored in a new block validated by the CHX. When Si moves conservation, connectivity, etc.). There are several criteria
to the Y network managed by a CHY, it sends an association for classifying WSN. Indeed, at each turn a new CH will be
request to the CHY. The latter sends a request to the elected, new nodes will be integrated into another cluster.
blockchain in order to verify whether Si was authenticated Nodes can change from one cluster to another depending on
before or not. the position of CH, new nodes cannot identify with the new
Network X Network Y
3 CH, Figure 3 and 4.
Nœud Si Nœud Si
Secure round i+1
Association Resp_Auth Req_Auth
CH i+1
Key Security of Si 9 4 CH CH
1 CHX 7 CHY
Si is trustworthy
CH i+1
Is Si trustworthy
2
5 8
6
a
n1 CHX : CHY :
n2 Si_Authentication Si_Authentication
… … Figure 3. Formation of the round i cluster

CH
Block Block n+i Block m
n … … CH
The Blockchain

Figure 2. The operating mechanism

When the CHY is informed by the blockchain that Si is


Figure 4. Formation of the round i + 1 cluster
reliable and that it has been authenticated by the network X,
it requests the CHX via a secure channel for Si secret
Cluster X with its CHX identifies these members. CHX sends
information. The CHY sends an association response
a transaction, signed by its private key, to the blockchain
containing the key of dissemination of its network. Finally,
with as information all the members are authenticated "CHX:
the Y network associates the sensor, and sends the "CHY:
all Authentication", which means that the CHX cluster is the
Si_Authentication" transaction after a successful encryption
guarantor that all the nodes are trusted, and that CHX owns
/ decryption operation with Si. If Si wants to move again to
the symmetric keys of all nodes. This transaction is stored in
the Z network or another network, the latter asks the
a new block validated by the CHX. When one of the Si nodes
blockchain information about Si, and the result will be
moves to the Y cluster managed by a CHY, it sends an
["CHX: Si_Authentication", "CHY: Si_Authentication"], in
association request to the CHY indicating its old CHX cluster.
this case CHZ takes the last authentication from CHY to get
The latter sends a request to the blockchain in order to check
symmetric keys from Si and so on as in the case of a mobile
whether Si was authenticated before CHX or not. When the
base station moving from one cluster to another in the same
CHY is informed by the blockchain that Si is trusted and that
network or from one network to another.
it has been authenticated by cluster X. The CHY sends an

Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on January 18,2022 at 04:10:12 UTC from IEEE Xplore. Restrictions apply.
association response containing the broadcast key for its
network. Finally, the cluster Y associates the sensor, and 40
sends the transaction "CHY: Si_Authentication" after a
successful encryption / decryption operation with Si. 35

IV. PERFORMANCE AND EVALUATION 30


We carried out 10 tests of without security, classical No Security
25 Classic Security
association and association blockchain. In order to properly
Blockchain Security IoT

T im e(m s )
assess our system, study the security needs, and define the
20
necessary protective countermeasures, we have created a
protocol, which represents a procedure for analyzing a
15
security protocol in order to identify its objectives and its
objectives vulnerabilities.
10
First, in the without security mode, a device exchanges only
2 messages with a CH to be associated with its network. It 5
sends an association request and receives a response,
without any calculations. Then, in the classic secure 0
association, a device exchanges 4 messages with the CH. 1 2 3 4 5 6 7 8 9 10
Number of tests performed for mobile nodes
The two entities authenticate each other using One Time
Password (OTP), and generate symmetric keys. The average Figure 5. Blockchain security IoT for mobile node
value of the "No secure" execution time is equal to 0.6 ms
According to figure 6, for the association of a node from one
as long as the "classic Security" disk is equal to 35ms.
cluster to another, the average value of the “classic Security”
Therefore, the execution time of this mode is almost 58.3
execution time is equal to 35 ms as long as the protocol
times the time of the unsafe mode. The validation time of a
“Blockchain security IoT” is equal to 13 ms. The execution
transaction using a local copy of a private blockchain takes
time is optimized, it represents only 21 times the execution
on average 0.250 ms, because in this case we do not use a
time in the unsecured mode, and saves us 62.8% of the time
validation mechanism, compared to the public blockchain
used by the classic security association. This time represents
which takes 14 S to validate a transaction.
the duration of the exchange of 2 messages, between the
From Figure 5, for the mobile node association, the average
device and the CH (without security), plus the duration of
value of the "classic Security" execution time is equal to 35
validation of the CH transaction by the blockchain and the
ms while the protocol "Blockchain security IoT" is equal to
duration of device decryption through the key of cluster X.
18 ms. the execution time is optimized. It represents only 30
The figure 7 show the total energy consumed during the
times the execution time in the unsecured mode, and saves
association time of the device, which represents the sum of
us 48.6% of the time used by the classic security association.
the energy consumed during the treatment and that of the
This time represents the duration of the exchange of 2
communication. From the three curve results, we can see
messages, between the device and the CH (without security),
that the total energy consumed by the device in non-secure
plus the duration of validation of the CH transaction by the
mode is low because the device only sends an association
blockchain and the duration of device decryption through
request and receives an association response without
the key of network X.
performing any security processing.

Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on January 18,2022 at 04:10:12 UTC from IEEE Xplore. Restrictions apply.
40 1.4

35
1.2

30
1
No Security
25 No Security
Classic Security
Classic Security

E nergy (m J )
T im e(m s )

0.8 Blockchain Security IoT


Blockchain Security IoT
20

0.6
15

10 0.4

5 0.2

0
1 2 3 4 5 6 7 8 9 10 0
Number of tests performed for moving a node from one cluster to another 1 2 3 4 5 6 7 8 9 10
Number of tests performed for moving nodes
Figure 6. Blockchain security IoT for moving a node in another cluster
Figure 8. The energy consumption for moving nodes

1.4
CONCLUSION
1.2 To overcome these problems, after a study, our BSI protocol
provides all basic security services with good performance,
No Security and also, offers much more flexibility and optimization of
1
Classic Security
Blockchain Security IoT
energy and time for constrained objects. All the scenarios
presented the mobility of devices, the movement of a device
E nergy (m J )

0.8
from one cluster to another and the mobile nodes allow
0.6 transactions to be managed from one network to another or
from one cluster to another in a completely transparent way
0.4 and without any human intervention. The CHs have a global
vision of all the nodes participating in the cluster.
0.2
REFERENCES
[1] G. Paul, P. Sarkar, and S. Mukherjee, “Towards a more democratic
0
1 2 3 4 5 6 7 8 9 10 min-ing in Bitcoins,” inProc. 10th Int. Conf. Inf. Syst. Security
Number of tests performed for mobile nodes (ICISS),Hyderabad, India, Dec. 2014, pp. 185–203.
[2] Ralph C Merkle. A digital signature based on a conventional
Figure 7. The energy consumption for mobile nodes encryption function.In Conference on the Theory and Application of
Figure 8 shows the total energy consumed during the Cryptographic Techniques, Springer, 1987, pp. 369–378.
[3] A. Maxmen, ‘‘Ai researchers embrace bitcoin technology to share
association time of the device at the time of moving node. medical data,’’Nature, Mar. 2018, vol. 555, pp. 293–294.
The two classic association curves and blockchain [4] Biggs John. Hackers release source code for a powerful DDoS app
called Mirai, October 2016.
association consume more energy than a network without [5] T. M. Fernández-Caramés and P. Fraga-Lamas, “A review on the use
security. of blockchain for the Internet of Things,”IEEE Access,vol.6,pp.
32979–33001, 2018.
The energy consumption of the moving nodes association [6] K. Yeow, A. Gani, R. W. Ahmad, J. J. P. C. Rodrigues, and K.
based in clustering is lower than the energy consumption of Ko,“Decentralized consensus for edge-centric Internet of Things: A
the mobile nodes association. this is since the mobile node review, taxonomy, and research issues,”IEEE Access, vol. 6, pp. 1513–
1524,2018.
has enough processing, especially when it comes to mobility [7] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A.
between several networks. The energy consumption of the Puliafito,“Blockchain and IoT integration: A systematic
survey,”Sensors,vol. 18, no. 8, p. 2575, 2018.
moving nodes association does not exceed 0.6 mJ.

Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on January 18,2022 at 04:10:12 UTC from IEEE Xplore. Restrictions apply.
[8] Muhammad Salek Ali, Massimo Vecchio, Miguel Pincheira, Koustabh [26] Y. Gilad, R. Hemo, S. Micali, G. Vlachos, and N. Zeldovich,
Dolui, Fabio Antonelli, and Mubashir Husain Rehmani, “Applications ‘‘Algorand:Scaling byzantine agreements for cryptocurrencies,’’
of Blockchains in the Internet ofThings: A Comprehensive Survey”, inProc. 26th Symp.Oper. Syst. Princ., 2017, pp. 51–68.
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2019, [27] S. De Angelis, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri,
VOL. 21, NO. 2, pp. 1676-1717. andV. Sassone, ‘‘PBFT vs proof-of-authority: Applying the CAP theo-
[9] T. Neudecker and H. Hartenstein, “Network layer aspects of permis- rem to permissioned blockchain,’’ inProc. ITASEC, 2018, pp. 1–11.
sionless blockchains,”IEEE Commun. Surveys Tuts., to be [28] Neil Haller, Craig Metz, Phil Nesser, and Mike Straw. A one-time
published,doi:10.1109/COMST.2018.2852480. password system.Technical report, 1998.
[10] M. Conoscenti, A. Vetrò, and J. C. De Martin, “Blockchain for [29] D M’Raihi, M Bellare, F Hoornaert, D Naccache, and O Ranen. HOTP
theInternet of Things: A systematic literature review,” inProc. : An HMAC-based one-time password algorithm. IETF, RFC 4226,
IEEE/ACS13th Int. Conf. Comput. Syst. Appl., 2016, pp. 1–6. December 2005.
[11] K. Christidis and M. Devetsikiotis, “Blockchains and smart [30] William Allen Simpson. PPP challenge handshake authentication
contractsfor the Internet of Things,”IEEE Access, vol. 4, pp. 2292– protocol (CHAP).1996.
2303, 2016. [31] Tara Salman, Maede Zolanvari, Aiman Erbad, Raj Jain, and
[12] W. Cai, Z. Wang, J. B. Ernst, Z. Hong, C. Feng, and V. C. M. Mohammed Samaka, “Security Services Using Blockchains: A Stateof
Leung,‘‘Decentralized applications: The blockchain-empowered the Art Survey”, IEEE COMMUNICATIONS SURVEYS &
software sys-tem,’’IEEE Access, vol. 6, pp. 53019–53033, 2018. TUTORIALS, VOL. 21, NO. 1, 2019, pp. 858-880.
[13] T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, [32] Wassim Jerbi, Abderrahmen Guermazi, and Hafedh Trabelsi, “A
‘‘Securityservices using blockchains: A state of the art survey,’’IEEE secure routing protocol in heterogeneous networks for internet of
Commun.Surveys Tuts., to be published, doi: things”, International Wireless Communications and Mobile
10.1109/COMST.2018.2863956. Computing Conference (IWCMC), 2020, pp.571-576
[14] R. B. Uriarte and R. De Nicola, ‘‘Blockchain-based decentralized [33] Wassim Jerbi, Abderrahmen Guermazi, and Hafedh Trabelsi, “Crypto-
cloud/fog solutions: Challenges, opportunities, and ECC: a rapid secure protocol for large-scale wireless sensor networks
standards,’’IEEECommun. Standards Mag., vol. 2, no. 3, pp. 22–28, deployed in internet of things”, DepCoS-RELCOMEX, Advances in
Sep. 2018. Intelligent Systems and Computing (AISC), Springer, Vol. 1173, pp.1–
[15] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On blockchain 11, https://doi.org/10.1007/978-3-030-48256-5_29.
and its integration with IoT. Challenges and opportunities,”Future [34] Wassim Jerbi, Abderrahmen Guermazi, and Hafedh Trabelsi , “A novel
Gener. Comput. Syst., vol. 88, pp. 173–190, Nov. 2018. secure routing protocol of generation and management cryptographic
[16] Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi, “ High keys for wireless sensor networks deployed in internet of things”, Int.
Coverage of Connected Nodes routing protocol with reduced power J. High Performance Computing and Networking, Vol. 16, Nos. 2/3,
consumption for multi-hop Wireless Sensor Network”, Euro-American 2020, pp. 87-94.
Conference on Telematics and Information Systems (EATIS 2018), [35] Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy efficient
November 12–15, 2018, Fortaleza, Brazil, communication protocol for wireless microsensor networks”, in
https://doi.org/10.1145/3293614.3293645 Proceedings of the 33rd Annual Hawaii International Conference on
[17] Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi. “A novel secure routing System Sciences, Jan 2000, 10 pp. vol.2.
protocol of generation and management cryptographic keys for WSN deployed [36] Younis, O.; Fahmy, S. “HEED: A hybrid, energy-efficient, distributed
in IoT”, International Journal of High Performance Computing and Networking clustering approach for ad-hoc sensor networks”. IEEE Trans. Mobile
(ijhpcn), 2020, VOL 16, DOI: 10.1504/IJHPCN.2020.112693 Comput. 2004, vol 3, 366–379.
[18] Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi. “A novel energy [37] Loscri, V.; Morabito, G.; Marano, S. “A Two-Level Hierarchy for
consumption approach to extend the lifetime for wireless sensor network”,
Low-Energy Adaptive Clustering Hierarchy”. In Proceedings of the
International Journal of High Performance Computing and Networking (ijhpcn),
2020, VOL16, doi.org/10.1504/IJHPCN.2020.112702 2nd IEEE Semiannual Vehicular Technology Conference, Dallas, TX,
[19] Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi, “A Clustering USA, 25–28 September 2005; pp. 1809–1813.
Protocol for Maximum Coverage in Large-Scale Wireless Sensor Networks”, [38] Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi. “O-LEACH
International Journal of Business Data Communications and Networking of routing protocol for wireless sensor networks”, 13th International
(IJBDCN), vol 11 (2), 2015 Conference Computer Graphics, Imaging and Visualization“, CGiV
[20] Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi,“A routing 2016, Beni Mlel Marocco, Mar29-01, pp. 399-404,
protocolorphan-leach to join orphan nodes in wireless sensor net- DOI:10.1109/CGiV.2016.84.
work,”inComputer Science & Information Technology,pp. 135–147, Chennai, [39] Wassim Jerbi, Abderrahmen Guermazi, Omar Cheikhrouhou and
India, 2016.
Hafedh Trabelsi. “CoopECC: A Collaborative Cryptographic
[21] Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi, “Equilibrate
Mechanism for theInternet of Things”, Journal of Sensors, 2021, pp. 1-
and min-imize the energy consumption in a cluster for routing proto-cols in
wireless sensor Network,”International Journal ofWireless Networks and 8, https://doi.org/10.1155/2021/8878513
Broadband Technologies, vol. 5, no. 1,pp. 46–58, 2016. [40] Wassim Jerbi, Abderrahmen Guermazi, and Hafedh Trabelsi. 2020.
[22] T. T. A. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi, and J. Design and deployment of a securityprotocol to provide authentication
Wang,‘‘Untangling blockchain: A data processing view of blockchain services for connected objects.In Proceedings of Euro American
systems,’’IEEE Trans. Knowl. Data Eng., vol. 30, no. 7, pp. 1366– Conference on Telematics and Information Systems EATIS'20,Aveiro,
1385, Jul. 2018. Portugal.https://doi.org/10.1145/3401895.3401896
[23] KHALED SALAH, M. HABIB UR REHMAN, NISHARA [41] Wassim Jerbi, Abderrahmen Guermazi, and Hafedh Trabelsi, “Orphan
NIZAMUDDIN, and ALA AL-FUQAHA, “Blockchain for AI: node connected management in multi-hop clustering-based routing
Review andOpen Research Challenges”, IEEE Access, 2019,Vol 7, pp. protocols for wireless sensor networks”, International Journal of
10127-10149. Interdisciplinary Telecommunications and Networking, October–
[24] Tikhomirov, E. Voskresenskaya, I. Ivanitskiy, R. Takhaviev,E. December, 2019, Vol. 11, No. 4, p.1, DOI: 10.4018/IJITN.
Marchenko, and Y. Alexandrov, ‘‘Smart check: Static analysis of 2019100101
ethereum smart contracts,’’ inProc. IEEE/ACM 1st Int. Workshop [42] Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi, “A novel
Emerg. Trends Softw. Eng. Blockchain (WETSEB), May/Jun. 2018, clustering algorithm for coverage a large scale in WSN”, arXiv preprint
,pp. 9–16. arXiv:1605.03079 (2016).
[25] X. Boyen, C. Carr, and T. Haines, ‘‘Graphchain: A blockchain-free
scal-able decentralised ledger,’’ inProc. 2nd ACM Workshop
Blockchains, Cryptocurrencies, Contracts, 2018, pp. 21–33.

Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on January 18,2022 at 04:10:12 UTC from IEEE Xplore. Restrictions apply.

You might also like