You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

1 August 2022

A Novel Distributed Ledger Technology Structure for Wireless Sensor Networks Based on IOTA Tangle

,
,
and
1
Faculty of Computer Science, Dalhousie University, Halifax, NS B3H 4R2, Canada
2
Research and Development, Cistel Technology, Ottawa, ON K2E 7V7, Canada
3
TeleAI Corporation, Ottawa, ON K2E 7V7, Canada
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Blockchain Technology and Its Applications

Abstract

Wireless Sensor Networks (WSNs) consist of many wireless sensor nodes for collecting and sensing information. Distributed Ledger Technologies (DLTs) such as Blockchain allow organizations to store and share data in a decentralized, immutable, and secure way through a network of distributed peer-to-peer users or computers. The application of DLT to the Internet of Things (IoT) can improve the efficiency of information transmission and network security. IOTA Tangle is a DLT developed for IoT to process transactions. WSN is a core technology for IoT, and the two have a lot in common in terms of applications. Many solutions for IoT applications can be implemented with WSNs. However, the sensor nodes in WSNs have limited processing speed, storage capacity, communication bandwidth, and energy consumption capabilities. Therefore, a lightweight solution needs to be designed according to the characteristics of WSNs, rather than directly applying Tangle. The similarities between IoT and WSNs determine that the Tangle can be an essential reference for designing new solutions. In this paper, we propose a new DLT structure based on Tangle named Fishing Net Topology (FNT). The aim is to meet the lightweight requirements of sensor nodes in WSNs. We compared FNT with Tangle in terms of the packet network structure and algorithm and also experimentally analyzed the waste rate in the FNT network. It is concluded that FNT can be used at a reasonable Rate based on the requirement of the WSN applications, and it can significantly reduce the computation while enhancing the security of WSNs. Due to its structural stability and algorithmic simplicity, FNT outperforms Tangle in WSNs.

1. Introduction

Wireless Sensor Networks (WSNs) consist of many sensor nodes deployed in specific environments for monitoring and collecting information and data. Nodes in WSNs are limited by their size, computational power, power consumption, and memory size [1], resulting in their vulnerability to various types of attacks. The sensor nodes are susceptible to vandalism, physical damage, or hardware problems. Further, the sensor nodes are susceptible to being compromised and controlled as malicious nodes, leading to data leakage or the generation of false data.
Distributed Ledger Technologies (DLTs), such as Blockchain, offer a decentralized, immutable and secure network of distributed peer-to-peer users or machines to store and process transactions securely [2]. DLT involves many computer technologies such as distributed systems, cryptography, data structures or consensus algorithms [3]. Information in DLT is distributed in a network of nodes, and updates or modifications generated in the network are immediately reflected in the ledgers of all participants [4].
IOTA is a DLT designed for the Internet of Things (IoT) that is energy-efficient, scalable, lightweight, and can be transacted over the Blockchain network without any fees [5]. IOTA uses a Directed Acyclic Graph (DAG) architecture called the Tangle, so no blocks are used. Attaching a new transaction requires approval from two previously submitted transactions [6].
The IOTA technology uses DLT to enable IoT to improve network security, which provides a new idea for solving similar problems in WSNs. IOTA is designed for IoT, but WSNs are different from IoT because WSNs have a relatively simple architecture [5,7]. Constrained by hardware and software, WSNs need a lightweight solution. Therefore, refactoring and algorithm simplification for IOTA is a feasible solution.
We propose a new IOTA Tangle-based distributed ledger topology for WSN applications named Fishing Net Topology (FNT). In FNT, the network is divided into the Initial Network and the Formal Network, and the rate is specified according to the scale of WSNs. The network is initialized by gradually increasing the number of FNT nodes starting from one and then moving to the Formal Network to achieve a situation in which the two other FNT nodes approve each node. FNT still uses a node attachment idea similar to Tangle. New nodes need to be attached to the network by approving two specified nodes. FNT does not use the complex tip selection algorithm and cumulative weight calculation in IOTA. Instead, it uses a simple node index position calculation method to find tips for attachment, thus saving computing power to meet the energy-saving and lightweight requirements of WSNs.
Although the standardization of protocols is advanced, the main focus of our paper is different. What we propose is a network topology for data transmission designed for WSNs, which will validate and store the sensed data submitted by WSN nodes in the gateway in an application scenario. It enables WSNs to process information securely and efficiently under restricted sensor nodes. Current protocol standardization does not address this aspect, so we believe the proposal provides a new solution for the application of Blockchain and IOTA in WSNs.
The composition of this paper is as follows. Section 2 introduces the background and related work and briefly describes WSNs, IoT, Blockchain, and IOTA Tangle technologies. Section 3 describes the proposed FNT in detail, including its structure, components, algorithms, terminology explanation, and functions. Section 4 shows the comparison between FNT and Tangle and the experimental design and results. Section 5 summarizes the entire paper and mentions the shortcomings of FNT and subsequent improvement ideas.

3. Methodology

3.1. Fishing Net Topology

In Wireless Sensor Networks (WSNs), many sensor nodes transmit data to a gateway, making the data available to users through the Internet. We propose a Blockchain topology designed for WSN applications called Fishing Net Topology (FNT) because its structure is similar to a fishing net. In the gateway, we use the FNT structure to verify the data and make it available for secure and fast transmission, as shown in Figure 2.
Figure 2. Wireless Sensor Networks and Fishing Net Topology.
In terms of structure, FNT is divided into two parts: the Initial Network and the Formal Network. The Initial Network is used to initialize the network to reach the maximum data packet throughput gradually, and after the initialization is completed, it enters the Formal Network. In FNT, each node represents a packet submitted by a sensor in WSNs at a point in time, and after the FNT node is created, it needs to approve two specified FNT nodes and thus be attached to the network. The two approved FNT nodes are called the Tips of that node. The FNT node also needs to be approved by two new FNT nodes afterward, and they are called Approvers of that FNT node.

3.2. Terminology

Figure 3 shows a case of FNT with a rate of 6 when 100 nodes are inserted. This figure is used as an example to explain some key terminologies.
Figure 3. FNT case when the rate is 6 and 100 nodes are inserted.

3.2.1. Rate

The maximum height in the network structure is called the rate. The rate represents the packet throughput in the network and is the maximum number of packets passing through the network simultaneously.

3.2.2. Layer

The columns in the network structure are called layers, and the first layer has one FNT node, the second layer has two, and so on. The number of layers in the Initial Network is equal to the rate. The number of FNT nodes in the first layer is one, and the last layer equals the rate. The number of FNT nodes in the first layer of the Formal Network is one less than the rate, in the second layer is equal to the rate, and so on.

3.2.3. Initial Network

The shape of the Initial Network is an equilateral triangle, with one FNT node in the first layer and two in the second layer. The number of FNT nodes in each layer is one more than the previous layer until the number of FNT nodes in a layer equals the rate. This means that the Initial Network part is over. The purpose of the Initial Network is to initialize the network so that it operates at maximum throughput. The Initial Network is considered the dataset formed during the initial phase of WSNs deployment, so the data here are considered secure and valid.

3.2.4. Formal Network

As the central part of FNT, the maximum throughput is achieved in the Formal Network. Not every layer of this part operates at maximum throughput because of the need to leave a free space so that each FNT node can be attached twice, thus enabling dual authentication of packets.

3.3. FNT Node

3.3.1. FNT Node Structure

FNT node refers to the packet that contains the sensor data. An FNT node should contain three parts of information, node information, sensor information, and data collected by sensors. As shown in Figure 4, the node information contains the node ID, timestamp and its Tips and Approvers. Sensor information includes its ID, current operating status, and location. The data collected by the sensor needs to indicate its data type. Depending on the actual application of different WSNs, the information contained in the nodes may vary.
Figure 4. FNT node structure.

3.3.2. Tips and Approvers

FNT Node refers to the packet that contains the sensor data. The Tip is an entity in the FNT that may be approved by the new node. The Approver is an entity in the FNT that approves the new node.
The Tip is an unapproved FNT node in the network, and they need to be approved by later FNT nodes, thus confirming the security of its data. Each Tip needs to be approved by two other nodes. The first node has no Tip. FNT Nodes on the edge of the Initial Network have only one Tip.
Approvers refer to the two later FNT nodes that approve the specified FNT node in the network. When a new node is created, it does not have an Approver, and it needs to wait for the subsequent nodes to approve it. Every FNT node should have two Approvers, which means every node needs to be approved twice.
As shown in Figure 5, taking node 22 as an example, its Tips are nodes 16 and 17, and its Approvers are nodes 27 and 28.
Figure 5. Tips, Approvers, and FNT node detach.

3.4. FNT Node Detach

In WSNs, if a sensor node is attacked or malfunctions, that node may produce erroneous data. If the data are submitted to the dataset, it can threaten the security and integrity of the entire dataset. Therefore, packet detaches are provided in FNT for tracing the malicious sensor nodes. Based on the tamper-proof property of the Blockchain, the malicious packet submitted to FNT cannot be simply deleted. FNT can isolate the malicious packet by detaching it from all related packets while the data are still viewable and still kept in the dataset. The network administrator can adopt some security strategies to deal with the data of the malicious packet to ensure it will not affect the entire dataset. As shown in Figure 5, the malicious packet 68 is detached from the network, while the other packets are not affected.

3.5. Tip Selection Algorithms

Figure 6 shows a case of FNT with a rate of four. The left is the Tip selection algorithm in the Initial Network, and the right is the Tip selection algorithm in the Formal Network.
Figure 6. Tip selection algorithms for the Initial Network and the Formal Network.

3.5.1. Tip Selection Algorithm in the Initial Network

In the Initial Network, each new FNT node is added to the Tip List and attached to the network, and the Tips for that node are also assigned. Node 0 has no Tips, and the nodes on the edge have only one Tip, which means that each arrow sent from the node represents one Tip selection. If a node is attached twice in the Tip List, it will be removed. When a new node is created, it is first added to the Tip List, then the first element in the Tip List is viewed and attached. At this point, the element is attached by two nodes, the current node and the previous node, it is removed from the Tip List, and then the first element in the Tip List is updated. Thus, each Tip selection will select the first element in the Tip List until the element is attached twice. Then it is no longer a Tip and becomes a normal node.

3.5.2. Tip Selection Algorithm in the Formal Network

The first layer has one less node than the rate, so at this layer, the index of node subtracting r 1 gives the index of the first Tip and subtracting r 2 gives the index of the second Tip. The number of nodes in the second layer is equal to the rate. The index of the first Tip of the node at the top is obtained by subtracting r 3 from its index, and the index of the second Tip is obtained by subtracting r 2 from its index. The index of the first Tip of the node at the bottom is obtained by subtracting r 3 from its index, and the index of the second Tip is obtained by subtracting r 1 from its index. The indexes of the two Tips of the other nodes are their index subtracting r 1 and r 2 , respectively. The next part of the Formal Network has the same method of Tip selection as the first and second layers described above.
r 1 = r a t e r 2 = r a t e 1 r 3 = r 1 + r 2

4. Results and Discussion

4.1. Compare with the Tangle

The difference in Tip Selection Algorithm (TSA) determines a very different structure of FNT and Tangle. Tangle uses MCMC and URTS algorithms as examples of tip selection strategies [31]. These strategies make each tip selection very random, accounting for the increased time and efficiency cost, which also complicates the structure of Tangle. In contrast, FNT avoids using complex tip selection algorithms and instead appends them with simple node index computation. In addition, each new node has predefined tips in the network, so there is no selection process. This also saves much time and computational effort. Figure 7a,b show a comparison of the structure of FNT and Tangle, with FNT being more concise and straightforward.
Figure 7. Structure comparison of FNT and Tangle. (a) FNT structure. (b) Tangle structure [41].
The cumulative weight is essential in Tangle because the TSA relies heavily on cumulative weights. However, this becomes one of the most complex calculations in Tangle. In Tangle, each transaction is assigned an initial weight, and when a new transaction is attached to this transaction, the weight of this transaction becomes the sum of the weights of the two transactions. Therefore, the cumulative weight is the sum of the weights of all the transactions that are directly and indirectly attached to that transaction [29]. It can be seen that the calculation of the cumulative weight of a transaction requires traversing all its attachers in the network, which is a very complex calculation. Since the complex TSA is discarded, FNT also does not rely on cumulative weights.
Taking a network with a rate of six and 100 nodes as an example, Figure 8a,b shows the cumulative weights of each node under the two structures of FNT and Tangle, respectively. The trend of the cumulative weights in the figures also reflects the difference between the two structures. FNT has a more straightforward structure, so the trend of the cumulative weights is stable. While Tangle has a complicated structure, the cumulative weight trend is unstable. The above examples are only used to compare the differences between the two structures. FNT does not use cumulative weights.
Figure 8. Comparison of the cumulative weights of the nodes in FNT and Tangle. (a) Cumulative weights in FNT. (b) Cumulative weights in Tangle [41].

4.2. Waste Rate

In FNT, each node needs to be approved by two other FNT nodes. To implement this strategy, not every layer in the FNT structure can operate at the maximum rate, and some positions in the structure are wasted. In order to maximize the utilization of FNT, we can find the optimal solution by calculating the waste rate. The main waste occurs in the Initial Network, assuming an FNT with a rate of 10. The first layer has only one node, resulting in a waste of nine nodes, and the second layer results in a waste of eight nodes. The last layer of the Initial Network has no waste. Moreover, there is a waste of one node in every second layer in the Formal Network.
r = Rate . T n = The number of FNT nodes in the Initial Network . S = The number of FNT nodes in the network . F = The number of FNT nodes in the case where nodes are fully placed in every layer . W = The waste of FNT node placements in some layers . W R = Waste rate .
S = F W
T n = r + 1 2 = ( r + 1 ) ! 2 ! ( r + 1 2 ) !
F = r 2 + 2 r S T n 2 r 1
W = r 2 T n + S T n 2 r 1
W R = W F
The waste rate W R can be calculated by Equation (5), using the number of wasted nodes divided by the total number of nodes in the complete arrangement.
The number of FNT nodes in the complete arrangement case can be calculated using Equation (3). The Initial Network is an equilateral triangle, a square under the complete arrangement, and the number of nodes is the square of the rate. The number of nodes in the Formal Network equals the total number of nodes by subtracting the number of nodes in the Initial Network. The number of nodes in the Formal Network is divided by the number of nodes in one group to obtain the number of groups. Then, multiplying by twice the rate gives the number of nodes in the Formal Network under the complete arrangement. This gives the total number of nodes F under the complete arrangement.
The number of wasted FNT nodes is calculated by Equation (4). The waste of the Initial Network is obtained by subtracting the actual number of nodes from the number of nodes of the Initial Network under the complete arrangement. Each group of the Formal Network represents one waste, so the number of groups is equal to the waste of the Formal Network. This gives the waste of the entire network W.

4.3. Results

We use an example with a rate of five and 100 FNT nodes inserted to show the calculation process for the waste rate data shown in the subsequent figures and tables. The waste rate obtained in this case is 16.2791%.
W R = W F = r 2 T n + S T n 2 r 1 r 2 + 2 r S T n 2 r 1 = r 2 r + 1 2 + S r + 1 2 2 r 1 r 2 + 2 r S r + 1 2 2 r 1 = r 2 ( r + 1 ) ! 2 ! ( r + 1 2 ) ! + S ( r + 1 ) ! 2 ! ( r + 1 2 ) ! 2 r 1 r 2 + 2 r S ( r + 1 ) ! 2 ! ( r + 1 2 ) ! 2 r 1 = 5 2 ( 5 + 1 ) ! 2 ! ( 5 + 1 2 ) ! + 100 ( 5 + 1 ) ! 2 ! ( 5 + 1 2 ) ! 2 5 1 5 2 + 2 5 100 ( 5 + 1 ) ! 2 ! ( 5 + 1 2 ) ! 2 5 1 0.162791 = 16.2791 %
Figure 9a,b show the waste curves at rates of 5 and 10, respectively, and S represents the number of FNT nodes in the networks. The same rate causes the curves to overlap. In the figures, the cumulative waste rate decreases. When the rate is five, with 1000 nodes, the waste rate is 10.71 % . When the rate is 10, with 100,000 nodes, the waste rate is 5.04 % .
Figure 9. Comparison of the waste rate under the different number of FNT nodes. (a) Rate is 5. (b) Rate is 10.
Figure 10a shows the comparison of waste rates when there are 1000 nodes, and the rates are 5, 10, 20, and 30, respectively. With 1000 nodes, the optimal rate is between 5 and 10. Figure 10b shows the comparison of waste rates when there are 100,000 nodes, and the rates are 10, 20, 50, and 100, respectively. With 100,000 nodes, the optimal rate is between 50 and 100. The specific optimal rate value can be calculated within this range.
Figure 10. Comparison of the waste rate under the different rates. (a) 1000 FNT Nodes. (b) 100,000 FNT Nodes.
In Table 2, the waste rate of FNT composed of the different number of FNT nodes and different rates is shown. Experiments ranged in rates from 5 to 1000 and the number of nodes from 100 to 1,000,000.
Table 2. The waste rates under the different rates, and number of FNT nodes.
Due to space limitations, this table only shows some combinations of rates and packet numbers. As can be seen in Table 2, the greater the number of packets, the lower the waste rate for the same rate. However, a higher rate does not result in a lower waste rate for the same number of packets. At a rate of 10, the waste rate decreases as the number of packets increases, from 32.1429 % at 100 packets to 5.0038 % at one million packets, and will continue to decrease. When there are one million packets, the lowest waste rate occurs between 50 and 120, which is about 0.9852 % . At this point, the waste rate is already below 1 % . Such a combination of rate and number of packets is considered optimal, as its waste rate is minimal. More accurate optimal rates, which are not shown in the table, require further calculations between 50 and 120.
In summary, having an optimal rate for different numbers of packets can minimize the waste of the network. Thus, when establishing FNT, predicting the number of packets that may be generated based on the size of the WSNs can help users determine an optimal rate so that users can choose the most appropriate WSN plan based on actual demand and budget.

5. Conclusions and Recommendations

Based on the technical background of WSNs, IoT, Blockchain, and IOTA Tangle, we proposed Fishing Net Topology (FNT). FNT meets the energy-saving and lightweight requirements of WSNs. This paper elaborates on the structure, algorithm, and features of FNT. The comparison with Tangle and the experimental analysis of the waste rate of the FNT for different rates and the number of FNT nodes conclude that choosing a reasonable rate can significantly reduce waste and computation. FNT improves on two shortcomings of IOTA Tangle. First, it discards the complex tip selection algorithm and uses only a simple calculation of the node index to find tips and attach them. Second, the calculation of cumulative weights is not required in FNT. These improvements allow FNT to save computations and costs.
The FNT waste rate for different rates and the number of packets is shown in the figures and tables. At the same rate, the higher the number of packets, the lower the overall waste rate, and eventually, the trend will stabilize, as waste will persist. Calculating the optimal rate for the different number of packets of FNT is critical, and the choice of different rates can lead to a dramatic change in the result. We used the waste rate calculation formula and calculated the waste rate of some FNTs shown in Table 2, from the maximum waste rate close to 100 % to a minimum of less than 1 % . We can see that under the same packet number, as the rate increases, the waste rate decreases gradually to the minimum value and then starts to increase. We can obtain the minimum value of the waste rate, and the corresponding rate is the optimal rate.
The application scenario of FNT is shown in Figure 2. In WSNs, many sensor nodes are deployed in a specific environment for collecting and sensing data. Each sensor node should upload packets to the gateway at a preset time interval. The size of the FNT is also specified according to the user’s demand for the size of the WSNs, so its rate is preset. In the gateway, the submitted packets are attached to the FNT. Each packet needs to be validated against the data of its two Tips, also previously submitted packets. Since it is not attached by other packets, it is temporarily called Tips. Packets that pass the two Approvers validation become general FNT nodes. As more and more packets are attached to the FNT and verified by more and more packets, the authenticity of the data in the whole network is guaranteed. Users can access the FNT and its data stored in the gateway and more operations through the Internet.
In applying FNT, a reasonable rate should be calculated to save costs depending on the demand for WSNs. The cost of implementing FNT is mainly in the network service. FNT has no additional demand on the hardware of WSN nodes, so there is no additional cost. Higher network speed and bandwidth lead to more expenses, and the selection of the best rate in FNT is to refer users to choosing network services to reduce expenses. FNT aims to reduce the computation of WSN nodes while providing a secure and reliable data storage and transmission solution.
During the design of FNT, we took inspiration from the DAG structure of the IOTA Tangle and made many structural design attempts. Some of these solutions achieve higher network utilization but lack security, while others are faster processing but lack scalability. After comparison, we chose the current FNT structure. The FNT structure starts with one initial node, and each subsequent layer has one more node than the previous one until it reaches a preset rate value and completes the initialization. We need to verify each node twice to improve security, so the FNT structure is obtained. In the Formal Network, to enable each FNT node to be approved twice, it can be noticed that one FNT node position is wasted every two layers. This means that not every layer is operating at the maximum rate. Despite the waste, this approach can effectively improve packet security. In addition, the main challenge we face is how to measure the performance of FNT. We have calculated the waste in the network through formula derivation and program simulation. There should also be more measures that need to be improved in future studies.
FNT relies on a stable and lightweight security mechanism. When a new FNT node is attached, it must approve its Tips. The approval process requires first determining the operational and security status of the sensor nodes, and second the authenticity of the data contained in the packet. This requires creating a data model to estimate the range of data the sensor may acquire, which relies on historical sensing data from the environment in which the sensor is located. In future research, we plan to create this security model based on machine learning. The model will use a series of algorithms and historical data analysis to determine the authenticity of the data in the nodes to avoid polluting the entire dataset with data generated by malicious nodes. Therefore, in future work, we need to develop and validate a security model for data validation to improve the security of using FNT. There is also a need to evaluate the performance of FNT from more perspectives and add more metrics. We also need to identify the problems and improve them through practical applications.

Author Contributions

Conceptualization, H.Z., S.S. and M.Z.; methodology, H.Z.; project administration, H.Z., S.S. and M.Z.; software, H.Z.; supervision, S.S. and M.Z.; visualization, H.Z.; writing—original draft, H.Z.; writing—review and editing, H.Z., S.S., M.Z. and B.S. All authors have read and agreed to the published version of the manuscript.

Funding

The authors gratefully acknowledge the support in part by the Natural Sciences and Engineering Research Council (NSERC) and industry partners Norleaf Networks and Cistel Technology Inc., through a Collaborative Research Grant.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The essential functions and algorithms of the Fishing Net Topology project have been implemented using Python code and published to GitHub as an open-source platform, which can be found at https://github.com/Hongwei-Z/FishingNetTopology (accessed on 23 June 2022).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Singh, M.K.; Amin, S.I.; Imam, S.A.; Sachan, V.K.; Choudhary, A. A Survey of Wireless Sensor Network and its types. In Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 12–13 October 2018; pp. 326–330. [Google Scholar] [CrossRef]
  2. Suciu, G.; Nădrag, C.; Istrate, C.; Vulpe, A.; Ditu, M.C.; Subea, O. Comparative Analysis of Distributed Ledger Technologies. In Proceedings of the 2018 Global Wireless Summit (GWS), Chiang Rai, Thailand, 25–28 November 2018; pp. 370–373. [Google Scholar] [CrossRef]
  3. Antal, C.; Cioara, T.; Anghel, I.; Antal, M.; Salomie, I. Distributed ledger technology review and decentralized applications development guidelines. Future Internet 2021, 13, 62. [Google Scholar] [CrossRef]
  4. Bouras, M.A.; Lu, Q.; Zhang, F.; Wan, Y.; Zhang, T.; Ning, H. Distributed ledger technology for eHealth identity privacy: State of the art and future perspective. Sensors 2020, 20, 483. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Bhandary, M.; Parmar, M.; Ambawade, D. A Blockchain Solution based on Directed Acyclic Graph for IoT Data Security using IoTA Tangle. In Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 10–12 June 2020; pp. 827–832. [Google Scholar] [CrossRef]
  6. Shabandri, B.; Maheshwari, P. Enhancing IoT Security and Privacy Using Distributed Ledgers with IOTA and the Tangle. In Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 7–8 March 2019; pp. 1069–1075. [Google Scholar] [CrossRef]
  7. Khalil, N.; Abid, M.R.; Benhaddou, D.; Gerndt, M. Wireless sensors networks for Internet of Things. In Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 21–24 April 2014; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  8. Numan, M.; Subhan, F.; Khan, W.Z.; Hakak, S.; Haider, S.; Reddy, G.T.; Jolfaei, A.; Alazab, M. A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks. IEEE Access 2020, 8, 65450–65461. [Google Scholar] [CrossRef]
  9. Zawaideh, F.; Salamah, M. An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. Int. J. Commun. Syst. 2019, 32, e3878. [Google Scholar] [CrossRef]
  10. Ram Prabha, V.; Latha, P. Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wirel. Pers. Commun. 2017, 94, 2549–2559. [Google Scholar] [CrossRef]
  11. Zia, T.; Zomaya, A. Security Issues in Wireless Sensor Networks. In Proceedings of the 2006 International Conference on Systems and Networks Communications (ICSNC’06), Tahiti, French Polynesia, 29 October–3 November 2006; p. 40-40. [Google Scholar] [CrossRef]
  12. Salau, A.O.; Marriwala, N.; Athaee, M. Data security in wireless sensor networks: Attacks and countermeasures. In Mobile Radio Communications and 5G Networks; Springer: Berlin/Heidelberg, Germany, 2021; pp. 173–186. [Google Scholar]
  13. Du, X.; Chen, H.-H. Security in wireless sensor networks. IEEE Wirel. Commun. 2008, 15, 60–66. [Google Scholar] [CrossRef]
  14. binti Mohamad Noor, M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar] [CrossRef]
  15. Da Xu, L.; He, W.; Li, S. Internet of things in industries: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar]
  16. Zanella, A.; Bui, N.; Castellani, A.; Vangelista, L.; Zorzi, M. Internet of Things for Smart Cities. IEEE Internet Things J. 2014, 1, 22–32. [Google Scholar] [CrossRef]
  17. Porkodi, R.; Bhuvaneswari, V. The internet of things (IOT) applications and communication enabling technology standards: An overview. In Proceedings of the 2014 International Conference on Intelligent Computing Applications, Coimbatore, India, 6–7 March 2014; pp. 324–329. [Google Scholar]
  18. Elijah, O.; Rahman, T.A.; Orikumhi, I.; Leow, C.Y.; Hindia, M.N. An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges. IEEE Internet Things J. 2018, 5, 3758–3773. [Google Scholar] [CrossRef]
  19. Adamu, A.A.; Wang, D.; Salau, A.O.; Ajayi, O. An integrated IoT system pathway for smart cities. Int. J. Emerg. Technol. 2020, 11, 1–9. [Google Scholar]
  20. Salau, A.O.; Chettri, L.; Bhutia, T.K.; Lepcha, M. IoT based smart digital electric meter for home appliances. In Proceedings of the 2020 International Conference on Decision Aid Sciences and Application (DASA), Sakheer, Bahrain, 8–9 November 2020; pp. 708–713. [Google Scholar]
  21. Rana, A.K.; Salau, A.O.; Sharma, S.; Tayal, S.; Gupta, S. Internet of Things: Energy, Industry, and Healthcare; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
  22. Farahani, B.; Firouzi, F.; Luecking, M. The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. J. Netw. Comput. Appl. 2021, 177, 102936. [Google Scholar] [CrossRef]
  23. Akhtar, Z. From blockchain to hashgraph: Distributed ledger technologies in the wild. In Proceedings of the 2019 International Conference on Electrical, Electronics and Computer Engineering (UPCON), Aligarh, India, 8–10 November 2019; pp. 1–6. [Google Scholar]
  24. Chatterjee, R.; Chatterjee, R. An Overview of the Emerging Technology: Blockchain. In Proceedings of the 2017 3rd International Conference on Computational Intelligence and Networks (CINE), Odisha, India, 28 October 2017; pp. 126–127. [Google Scholar] [CrossRef]
  25. Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. [Google Scholar] [CrossRef]
  26. Viriyasitavat, W.; Hoonsopon, D. Blockchain characteristics and consensus in modern business processes. J. Ind. Inf. Integr. 2019, 13, 32–39. [Google Scholar] [CrossRef]
  27. Abou Jaoude, J.; George Saade, R. Blockchain Applications – Usage in Different Domains. IEEE Access 2019, 7, 45360–45381. [Google Scholar] [CrossRef]
  28. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef] [Green Version]
  29. Guo, F.; Xiao, X.; Hecker, A.; Dustdar, S. Characterizing IOTA Tangle with Empirical Data. In Proceedings of the GLOBECOM 2020-2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  30. Silvano, W.F.; Marcelino, R. Iota Tangle: A cryptocurrency to communicate Internet-of-Things data. Future Gener. Comput. Syst. 2020, 112, 307–319. [Google Scholar] [CrossRef]
  31. Kusmierz, B.; Staupe, P.; Gal, A. Extracting Tangle Properties in Continuous Time via Large-Scale Simulations. Technical Report. Working Paper. 2018. Available online: https://assets.ctfassets.net/r1dr6vzfxhev/4T4IAlxk9ym0eWco0UoQIQ/90094e746745b89253eb3636b4ad1597/Extracting_Tangle_Properties_in_Continuous_Time_via_Large_Scale_Simulations_V2.pdf (accessed on 10 May 2022).
  32. Hao, Y.; Li, Y.; Dong, X.; Fang, L.; Chen, P. Performance Analysis of Consensus Algorithm in Private Blockchain. In Proceedings of the 2018 IEEE Intelligent Vehicles Symposium (IV), Changshu, China, 26–30 June 2018; pp. 280–285. [Google Scholar] [CrossRef]
  33. Zhou, Z.; Li, R.; Cao, Y.; Zheng, L.; Xiao, H. Dynamic Performance Evaluation of Blockchain Technologies. IEEE Access 2020, 8, 217762–217772. [Google Scholar] [CrossRef]
  34. Fan, C.; Ghaemi, S.; Khazaei, H.; Musilek, P. Performance Evaluation of Blockchain Systems: A Systematic Survey. IEEE Access 2020, 8, 126927–126950. [Google Scholar] [CrossRef]
  35. Schueffel, P. Alternative Distributed Ledger Technologies Blockchain vs. Tangle vs. Hashgraph-A High-Level Overview and Comparison. Tangle vs. Hashgraph-A High-Level Overview and Comparison (15 December 2017). 2017. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3144241 (accessed on 28 June 2022).
  36. Ali, M.S.; Vecchio, M.; Pincheira, M.; Dolui, K.; Antonelli, F.; Rehmani, M.H. Applications of Blockchains in the Internet of Things: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1676–1717. [Google Scholar] [CrossRef]
  37. Pincheira, M.; Vecchio, M. Towards Trusted Data on Decentralized IoT Applications: Integrating Blockchain in Constrained Devices. In Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  38. Pincheira, M.; Vecchio, M.; Giaffreda, R. Benchmarking Constrained IoT Devices in Blockchain-Based Agri-Food Traceability Applications. In International Congress on Blockchain and Applications; Springer: Berlin/Heidelberg, Germany, 2021; pp. 212–221. [Google Scholar]
  39. Pincheira, M.; Vecchio, M.; Giaffreda, R.; Kanhere, S.S. Exploiting constrained IoT devices in a trustless blockchain-based water management system. In Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 2–6 May 2020; pp. 1–7. [Google Scholar] [CrossRef]
  40. Worlu, C.; Jamal, A.A.; Mahiddin, N.A. Wireless sensor networks, internet of things, and their challenges. Int. J. Innov. Technol. Explor. Eng. 2019, 8, 556–566. [Google Scholar]
  41. Nghia, M. TangleSimulator. 2018. Available online: https://github.com/minh-nghia/TangleSimulator (accessed on 10 May 2022).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.