iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/CPE.6794
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T22:10:01Z","timestamp":1726351801340},"reference-count":47,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2021,12,20]],"date-time":"2021-12-20T00:00:00Z","timestamp":1639958400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2022,5]]},"abstract":"Abstract<\/jats:title>Blockchain is a database that contains the history of all exchanges made between its users since its creation. Blockchain is a new tool that enables essential distributed applications without the need for centralized trust. It is a transparent and secure technology for storing and transmitting information that operates without a central control body. Moreover, the large\u2010scale presence of wireless sensors, especially in the IoT, produce a large volume of data. This data must be protected to guarantee its correctness. However, due to the difficulty of encrypting this data, there are many problems, including limited resources, whether in terms of computation, memory, or energy, as well as the complexity of encryption algorithms. Therefore, we wanted, through this article, to show the importance of adopting the blockchain in wireless sensors. This enables it to send data as quickly and securely as possible, as little of the literature has dealt with this topic. For this, one imaginable solution must be managed in WSN which is to put the necessary keys for networks or groups at the level of each sensor for the different scenarios implemented, mobile node and orphan nodes, so that the latter can authenticate and link to these multiple networks or clusters, using our blockchain security IoT (BSI) protocol. The latter makes it possible to design a decentralized, transparent, and scalable authentication system, which does not negatively impact the performance of sensors or that of networks. This system must provide complete freedom to change the state of the sensor from one network to another, while ensuring the safety of the latter. This means that if a sensor is authenticated in a legitimate network, it becomes reliable and accepted by all other networks. This allows you to have a global vision on all networks. We evaluate the performance of our protocol with simulations using MATLAB. The results confirm that the BSI protocol is robust and efficient, provides lower power consumption and fast computing time.<\/jats:p>","DOI":"10.1002\/cpe.6794","type":"journal-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:45:06Z","timestamp":1640047506000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["BSI: Blockchain to secure routing protocol in Internet of Things"],"prefix":"10.1002","volume":"34","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1618-7469","authenticated-orcid":false,"given":"Wassim","family":"Jerbi","sequence":"first","affiliation":[{"name":"CES LAB, National School of Engineering of Sfax University of Sfax Sfax Tunisia"},{"name":"Higher Institute of Technological Studies Sfax Tunisia"}]},{"given":"Omar","family":"Cheikhrouhou","sequence":"additional","affiliation":[{"name":"CES LAB, National School of Engineering of Sfax University of Sfax Sfax Tunisia"},{"name":"Higher Institute of Technological Studies Sfax Tunisia"}]},{"given":"Abderrahmen","family":"Guermazi","sequence":"additional","affiliation":[{"name":"CES LAB, National School of Engineering of Sfax University of Sfax Sfax Tunisia"},{"name":"Higher Institute of Technological Studies Sfax Tunisia"}]},{"given":"Mohamed","family":"Baz","sequence":"additional","affiliation":[{"name":"College of CIT Taif University Taif Saudi Arabia"}]},{"given":"Hafedh","family":"Trabelsi","sequence":"additional","affiliation":[{"name":"CES LAB, National School of Engineering of Sfax University of Sfax Sfax Tunisia"},{"name":"Higher Institute of Technological Studies Sfax Tunisia"}]}],"member":"311","published-online":{"date-parts":[[2021,12,20]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_7_3_1","unstructured":"EyalA GencerE SirerEG RenesseRV.Bitcoin\u2010NG: ascalable blockchain protocol. Proceedings of the 13th {USENIX} Symposium on Networked Systems Design and Implementation. (NSDI); 2016:45\u201059; Berkeley CA."},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"ConoscentiM Vetr\u00f2A De MartinJC.Blockchain for the Internet of Things: a systematic literature review. Proceedings of the IEEE\/ACS 13th International Conference of Computer Systems and Applications\u00a0(AICCSA); 2016:1\u20106; IEEE Agadir Morocco.","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"e_1_2_7_6_1","unstructured":"AliM NelsonJ SheaR FreedmanMJ.Blockstack: aglobal naming and storage system secured by blockchains. Proceedings of the USENIX Annual Technical Conference (USENIX ATC); 2016:181\u2010194; Denver CO."},{"key":"e_1_2_7_7_1","doi-asserted-by":"crossref","unstructured":"LiangX ShettyS ToshD KamhouaC KwiatK NjillaL.ProvChain: a blockchain\u2010based data provenance archi\u2010tecture in cloud environment with enhanced privacy and availability. Proceedings of the 17th IEEE\/ACM International Symposium on Cluster Cloud and Grid Computing. (CCGRID); 2017:468\u2010477; Madrid Spain.","DOI":"10.1109\/CCGRID.2017.8"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"FotiouN PolyzosGC.Decentralized name\u2010based security forcontent distribution using blockchains. Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); 2016:415\u2010420; San Francisco CA.","DOI":"10.1109\/INFCOMW.2016.7562112"},{"key":"e_1_2_7_9_1","doi-asserted-by":"crossref","unstructured":"PaulG SarkarP MukherjeeS. Towards a more democratic min\u2010ing in Bitcoins \u201d in Proc. 10th Int. Conf. Inf. Syst. Security (ICISS) Hyderabad India Dec. 2014 pp. 185\u2013203.","DOI":"10.1007\/978-3-319-13841-1_11"},{"key":"e_1_2_7_10_1","doi-asserted-by":"crossref","unstructured":"MerkleRC.A digital signature based on a conventional encryption function. Proceedings of the Conference on the Theory and Application of Cryptographic Techniques; 1987:369\u2010378; Springer.","DOI":"10.1007\/3-540-48184-2_32"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-018-02641-7"},{"key":"e_1_2_7_12_1","unstructured":"JohnB.Hackers release source code for a powerful DDoS app called Mirai; October 2016."},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779263"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18082575"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2886932"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2852480"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"ZengY ZhangX AkhtarR WangC.A blockchain\u2010based scheme for secure data provenance in wireless sensor networks. Proceedings of the 2018 14th International Conference on Mobile Ad\u2010Hoc and Sensor Networks (MSN); 2018:13\u201018; Shenyang China.","DOI":"10.1109\/MSN.2018.00009"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098933"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"LazragH ChehriA SaadaneR RahmaniMD.A blockchain\u2010based approach for optimal and secure routing in wireless sensor networks and IoT. Proceedings of the 15th International Conference on Signal\u2010Image Technology & Internet\u2010Based Systems (SITIS); 2019:411\u2010415.","DOI":"10.1109\/SITIS.2019.00072"},{"issue":"2","key":"e_1_2_7_21_1","first-page":"1939","article-title":"A hybrid blockchain\u2010based identity authentication scheme for multi\u2010WSN","volume":"13","author":"Cui Z","year":"2020","journal-title":"IEEE Trans Serv Comput"},{"key":"e_1_2_7_22_1","unstructured":"JerbiW GuermaziA TrabelsiH.A novel clustering algorithm for coverage a large scale in WSN; 2016. arXiv preprint arXiv:1605.03079."},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJBDCN.2015070101"},{"key":"e_1_2_7_24_1","doi-asserted-by":"crossref","unstructured":"JerbiW CheikhrouhouO GuermaziA HamamH TrabelsiH.A blockchain based authentication scheme for mobile data collector in IoT. Proceedings of the 17th International Wireless Communications & Mobile Computing Conference (IWCMC); 2021:929\u2010934; IEEE. doi:10.1109\/IWCMC51323.2021.9498656","DOI":"10.1109\/IWCMC51323.2021.9498656"},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","unstructured":"JerbiW CheikhrouhouO GuermaziA BoubakerA TrabelsiH.A novel blockchain secure to routing protocol in WSN. Proceedings of the 22th International Conference on High Performance Switching and Routing (HPSR); 2021; Paris France. DOI:10.1109\/HPSR52026.2021.9481805","DOI":"10.1109\/HPSR52026.2021.9481805"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870644"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2863956"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2018.1800020"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-48256-5_29"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"e_1_2_7_33_1","unstructured":"TikhomirovE VoskresenskayaI IvanitskiyR TakhavievEM AlexandrovY.Smart check: static analysis of ethereum smart contracts. Proceedings of the IEEE\/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain\u00a0(WETSEB); May\/Jun 2018:9\u201016."},{"key":"e_1_2_7_34_1","doi-asserted-by":"crossref","unstructured":"BoyenX CarrC HainesT.Graphchain: a blockchain\u2010free scal\u2010able decentralised ledger. Proceedings of the 2nd ACM Workshop Blockchains Cryptocurrencies Contracts; 2018:21\u201033.","DOI":"10.1145\/3205230.3205235"},{"key":"e_1_2_7_35_1","doi-asserted-by":"crossref","unstructured":"JerbiW GuermaziA TrabelsiH. A secure routing protocol in heterogeneous networks for Internet of Things. Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC); 2020:571\u2010576.","DOI":"10.1109\/IWCMC48107.2020.9148502"},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2020.112693"},{"key":"e_1_2_7_37_1","doi-asserted-by":"crossref","unstructured":"HeinzelmanWR ChandrakasanA BalakrishnanH.Energy efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences; Vol. 2 January 2000:10 pp.","DOI":"10.1109\/HICSS.2000.926982"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1142\/7123"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.01.007"},{"key":"e_1_2_7_40_1","doi-asserted-by":"crossref","unstructured":"PatelST MistryNH.A review: sybil attack detection techniquesin WSN. Proceedings of the 2017 4th International Conference on Electronics and Communication Systems (ICECS); 2017:184\u2010188.","DOI":"10.1109\/ECS.2017.8067865"},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0365-5"},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.10.011"},{"key":"e_1_2_7_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.019"},{"key":"e_1_2_7_44_1","doi-asserted-by":"crossref","unstructured":"LoscriV MorabitoG MaranoS.A two\u2010level hierarchy for low\u2010energy adaptive clustering hierarchy. Proceedings of the 2nd IEEE Semiannual Vehicular Technology Conference; September 25\u201028 2005:1809\u20101813; Dallas TX.","DOI":"10.1109\/VETECF.2005.1558418"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"e_1_2_7_46_1","doi-asserted-by":"crossref","unstructured":"JerbiW GuermaziA TrabelsiH.O\u2010LEACH of routing protocol for wireless sensor networks. Proceedings of the 13th International Conference Computer Graphics Imaging and Visualization CGiV 2016; March 29 2016:399\u2010404 DOI:10.1109\/CGiV.2016.84","DOI":"10.1109\/CGiV.2016.84"},{"key":"e_1_2_7_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938001"},{"key":"e_1_2_7_48_1","doi-asserted-by":"crossref","unstructured":"HammiMT LivolantE BellotP SerhrouchniA PascaleM.A lightweight IoT security protocol. Proceedings of the 1st Cyber Security in Networking Conference; 2017:1\u20108.","DOI":"10.1109\/CSNET.2017.8242001"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.6794","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.6794","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.6794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T21:02:21Z","timestamp":1726347741000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.6794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,20]]},"references-count":47,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["10.1002\/cpe.6794"],"URL":"https:\/\/doi.org\/10.1002\/cpe.6794","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2021,12,20]]},"assertion":[{"value":"2021-01-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}