SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1594
Blockchain Secured Alternative to Mixed Routing/Non-Routing
Wireless Sensor Network Topologies for Industrial Settings
Peter L. Fuhr1, Sterling S. Rooke2
1Oak Ridge National Laboratory, One Bethel Valley Road, Oak Ridge, Tennessee, 37831 USA
2University of Tennessee, Dept of Electrical Engineering and Computer Science, Knoxville, Tennessee, 37996, USA
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Mesh networking of wireless sensors implies that
individual sensor nodes will be able to communicate with
neighboring nodes thereby forming a communication fabric.
In the case of traditional wireless sensors, their radio
frequency coverage – or RF footprint – is defined by the
maximum separation distance between neighboring nodes
while still achieving some level of, typically degrading from
maximum, information transfer (throughput). Security
issues arise in the situations where the sensor nodes are
deployed near the physical boundary of an industrial site
(edge nodes). In the more general case of the sensors relying
on omnidirectional antennas, the edge nodes’ RF footprint
may extend beyond the edge of the facility. If the edge nodes
perform as routing nodes, then it may be possible for similar
sensors/devices outside of the facility boundary to join the
network. While various schemes have been implemented to
address this security issue, we report on the possibility of
using blockchain for security of such edge nodes.
Key Words: wireless sensors, mesh networking, blockchain
1. REAL DETAILS OF MESH NETWORKING IN AN
INDUSTRIAL SETTING
There is a vast amount of “how mesh networks work”
information circulating in the literature ranging from
marketing briefs to technical papers [1-7]. In the context of
an industrial setting, it isn’t always so simple as to just
move the wireless transmitters around to get better RF
overlap while performing the measurement at a specific
required plant location in order to provide useful
information to the process engineer. A typical mesh
network topological diagram is shown in Fig. 1. In the
situation shown, each node is able to communicate with
each other node.
While Fig. 1 represents an idealized situation optimal
for discussion purposes, indicating that each node can
communicate with every other node, the reality is that this
would require each node to project its RF signal over every
other node. Assuming circular radiation patterns and that
each wireless sensor transmits at the same power with
identical omnidirectional antennas, then the associated RF
footprint for this idealized situation is as shown in Fig. 2.
Fig. 1. Typical mesh network diagram.
Fig. 2. Requirement for mesh-networking communication
of Fig. 1’s topology.
While Figs. 1 and 2 show the RF footprint realities
associated with wireless mesh networks1
, the reality of
industrial wireless sensors operating in mesh network
topologies is slightly different. Consider the following
situation: as previously mentioned, the circles shown in
Fig. 2 represent the idealized RF “footprint” of each radio-
enabled device. The “canyons of metal” and general
reflective surfaces found throughout an industrial or utility
site can significantly vary the actual RF footprint from
circular. The implications of the mesh requiring
1 …with identical omnidirectional antennas and radiated
powers…
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1595
overlapping RF footprints for full-mesh-functionality and
redundant information transport paths when such
footprints may vary significantly from circular – and from
each other – are, from an industrial deployment
perspective: a fully-integrated mesh, as shown in Fig. 1
therefore requires a number of transmitters to be located
in (relatively) close proximity.
The more realistic deployment scenario involves a
cloud or cluster of wireless field transmitters that are in
communication with and controlled by a wireless gateway
device. The gateway serves multiple roles, including:
(1) coordinating the mesh routing table,
(2) keeping track of the data transmission and network
timing functions,
(3) administering network security (frequently working
with a companion security manager), and
(4) administration of any frequency channel
“blacklisting/whitelisting”.
The practical situation is that as shown in Fig. 3 for a
simple wireless sensor network consisting of a gateway
and four nodes.
Fig.3. Idealized RF footprint map for a mesh network
gateway and four nodes.
Similar to Figs. 1 and 2, the color-coded Fig. 3 diagram
is meant to simply represent how the radio transceiver
(Gateway/Node) must be within the RF footprint of its
neighbors to be able to communicate with each other. In
Fig. 3’s hypothetical topology, the Gateway can only
communicate with Node #1 (for the Gateway lies within
Node 1’s RF footprint). Similarly, Node #1 lies within the
RF footprint of the Gateway, Node #2 and Node #4 – but
not Node #3. Therefore, from an RF “coverage” and
associated information transport perspective, Node #1 is
able to relay messages from Nodes 2 and 4, but not Node
#3. The associated mesh network connectivity diagram is
shown in Fig. 4 - which is quite different from the idealized
situation of Fig. 1.
Fig. 4. The connectivity diagram for Fig. 1’s RF footprint
coverage map.
Please note that in this hypothetical deployment
scenario, a non-robust communication network may
encounter a catastrophic network failure if the link
between the Gateway and Node #1 fails. The single-point of
failure may be alleviated by repositioning the Gateway
and/or the Nodes – a situation that an RF engineer may
suggest, but that may not be feasible due to the actual
locations of where the measurements are to be made.
2. Routing and Non-Routing Wireless Sensor Nodes
As their name implies, routing sensor nodes have the
dual capability of taking readings from their attached
sensors as well as communicating with neighboring sensor
nodes. In certain programmed activity, such a dual
capability sensor node may be (via some process)
appending its own sensor measurements with similar
packetized data coming from those neighboring sensor
nodes. While various protocols utilize methods for
restricting neighboring nodes from “joining the network2
”
exist, the general requirement then devolves into each
device either (a) possessing a table of allowed devices
(nodes) or (b) communicating with the gateway providing
“new” node information then receiving instructions as to if
the “new” node should be allowed to join the network. This
situation is depicted in Fig. 5.
An alternative to this scenario of all nodes being routing
nodes, is to have sensor nodes configured to function as
non-routing nodes. In this configuration, such nodes do not
possess the capability of serving as information pass-
throughs, but simply provide sensor readings into the
network. An alternative view of their performance is that
they are the edge-of-the-network nodes and do not repeat
or transport readings/information from any other node.
The deployment scenario is that the non-routing nodes are
positioned near the facility perimeter. Therefore, even
though the RF footprint extends outside of the facility, the
nodes simply do not repeat/relay/broadcast messages or
information. Note that the routing and non-routing nodes
must be deployed in a physical layout such that each non-
2 A common practice is the whitelisting of “allowed” devices.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1596
routing node may communicate with at least one routing
node. This mixed-node deployment strategy places an
extra burden on a facility’s maintenance and/or operations
staff due to the need to not inadvertently placing a routing
node where a non-routing node should be. Such a
deployment scenario is illustrated in Fig. 6.
A specific need for device authorization is depicted in
Fig. 7 – an illustration of the Texas Ship Channel – where
numerous companies operate side by side perhaps with
similar systems from a single vendor. The use of non-
routing nodes being deployed at the periphery of each
facility – coupled with routing nodes’ deployment to ensure
minimization of a node’s RF footprint extending beyond the
facility perimeter – is required.
Fig. 5. Sensors nodes capable of routing messages.
Fig. 6. Non-routing nodes are (physically) deployed along the periphery of the facility.
Fig. 7. Aerial view of the Texas (USA) ship channel where numerous industrial facilities are in close proximity to one
another. Networks deployed at neighboring facilities will not “cross-talk” if non-routing nodes are deployed along the
periphery of each facility.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1597
3. Provisioning of Mixed Routing & Non-Routing Edge
Nodes
Mesh networks exhibit various operational
characteristics for data transport in RF/physical
environments where the attenuation and multipath
circumstances may vary. This requires that the nodes be
capable of routing traffic from their neighbors (in
accordance with the network algorithm being used). From
an implementation perspective, this allows the
maintenance crew to deploy the nodes where they need to
be. But from a security perspective, this is not acceptable.
This situation may be taken care of by proper settings
inside the gateways (using unique IDs for each plants’
networks).
The provisioning of devices being added to the sensor
network is complex. Consider the provisioning state
diagram, presented as Fig. 8, which illustrates the steps
necessary to add/replace a sensor node. Note that this is a
complex coordination of security keys being exchanged
between the nodes and the gateway/controllers.
4. Blockchain for Sensor Validation
The implementation of sensor nodes programmed with
blockchain3
capabilities significantly reduces the
deployment and provisioning complexities associated with
the mix of routing and non-routing nodes. While a frequent
use of blockchain/DLT is tracking information exchanges
(transactions) [8-18], in this case of blockchain equipped
sensor nodes, the blockchain is used for authentication of
the nodes themselves. Such a process occurs for because
device information is released to all members of the
network through the distributed ledger and new
information is updated in real-time, providing reliability
and traceability of information [19-26].
Deployment of blockchain equipped sensor nodes
removes the need for the two categories of sensor nodes:
routing and non-routing for all devices are routing capable.
The capability of a “new” node – such as a rogue node – to
communicate with the network fabric is restricted by
examination of the ledger itself. If a new node attempts to
broadcast, the blockchain is queried as to if this new node
is allowed to join the network. The deployment situation is
illustrated in Fig. 9.
The reduction in deployment – and cataloging – routing
and non-routing sensor nodes’ locations eases the tasks for
facility maintenance and operation. A single class of devices
are used with network-centric (blockchain) validation of a
device’s “permission” to join the network used. Devices
that are “beyond-the-fence” are not authenticated into the
network traffic flow and therefore inherently not a threat,
leading to no need for routing/non-routing node
distinction.
3 …or more formally distributed ledger technology (DLT)…
5. Summary
The requirement to deploying a mixture of routing and
non-routing wireless sensor nodes to address security
issues that may arise due to RF footprints’ extending
beyond a facility’s physical boundary leads to maintenance
and operational impacts. The use of sensor nodes that may
operate in a blockchain alleviates the deployment issues.
6. References
[1] Y. Ai, M. Peng, and K. Zhang, “Edge computing
technologies for internet of things: a primer,” Digital
Communications and Networks, vol. 4, no. 2, pp. 77–
86, 2018.
[2] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog
computing for the internet of things: Security and
privacy issues,” IEEE Internet Computing, vol. 21, no.
2, pp. 34–42, 2017.
[3] R. Buyya and A. V. Dastjerdi, Internet of Things:
Principles and paradigms. Elsevier, 2016.
[4] A. Haroon, M. A. Shah, Y. Asim, W. Naeem, M.
Kamran, and Q. Javaid, “Constraints in the iot: the
world in 2020 and beyond,” Constraints, vol. 7, no.
11, 2016.
[5] A. Musaddiq, Y. B. Zikria, O. Hahm, H. Yu, A. K. Bashir,
and S. W. Kim, “A survey on resource management in
iot operating systems,” IEEE Access, vol. 6, pp. 8459–
8482, 2018.
[6] M. Conoscenti, A. Vetro, and J. C. De Martin,
“Blockchain for the internet of things: A systematic
literature review,” in Computer Systems and
Applications (AICCSA), 2016 IEEE/ACS 13th
International Conference of. IEEE, 2016, pp. 1–6.
[7] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on
security and privacy issues in internet-of-things,”
IEEE Internet of Things Journal, vol. 4, no. 5, pp.
1250–1258, 2017.
[8] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash
system,” 2008.
[9] I. Bashir, Mastering Blockchain. Packt Publishing Ltd,
2017.
[10] W. Mougayar, The business Blockchain: promise,
practice, and application of the next Internet
technology. John Wiley & Sons, 2016.
[11] J. wood, “Blockchain of things, cool things happen
when iot and distributed ledger tech collide,” Online,
2018, https://medium.com/trivial-co/Blockchain-
of-things-cool-things-happenwhen-iot-distributed-
ledger-tech-collide-3784dc62cc7b.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1598
[12] Sun, J.; Yan, J.; Zhang, K.Z. Blockchain-based sharing
services: What blockchain technology can contribute
to smart cities. Financ. Innov. 2016, 2, 26.
[13] Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An
overview of blockchain technology: Architecture,
consensus, and future trends. In Proceedings of the
2017 IEEE International Congress on Big Data
(BigData Congress), Honolulu, HI, USA, 25–30 June
2017; pp. 557–564.
Fig. 8. State transition diagram showing various paths to joining a secured network.
Fig. 9. Deployment scenario for blockchain-capable sensor nodes along the periphery of a facility.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1599
[14] Kraijak, S.; Tuwanut, P. A survey on internet of
things architecture, protocols, possible applications,
security, privacy, real-world implementation and
future trends. In Proceedings of the 2015 IEEE 16th
International Conference on Communication
Technology, Hangzhou, China, 18–20 October 2015;
pp. 26–31.
[15] Sharma, P.K.; Park, J.H. Blockchain based hybrid
network architecture for the smart city. Future
Gener. Comput. Syst. 2018, 86, 650–655.
[16] Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic
Cash System. 2008. Available online:
http://www.academia.edu/download/54517945/Bi
tcoin_paper_Original_2.pdf (accessed on 3 May
2019).
[17] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On
blockchain and its integration with iot. challenges
and opportunities,” Future Generation Computer
Systems, 2018.
[18] H. F. Atlam, A. Alenezi, M. O. Alassafi, and G. Wills,
“Blockchain with internet of things: Benefits,
challenges, and future directions,” International
Journal of Intelligent Systems and Applications, vol.
10, no. 6, pp. 40–48, 2018.
[19] Q. He, N. Guan, M. Lv, and W. Yi, “On the consensus
mechanisms of blockchain/dlt for internet of things,”
in 2018 IEEE 13th International Symposium on
Industrial Embedded Systems (SIES). IEEE, 2018, pp.
1–10.
[20] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram,
“Blockchain for iot security and privacy: The case
study of a smart home,” in Pervasive Computing and
Communications Workshops (PerCom Workshops),
2017 IEEE International Conference on. IEEE, 2017,
pp. 618–623.
[21] K. Christidis and M. Devetsikiotis, “Blockchains and
smart contracts for the internet of things,” Ieee
Access, vol. 4, pp. 2292–2303, 2016.
[22] K. Wust and A. Gervais, “Do you need a blockchain ”
in 2018 Crypto Valley Conference on Blockchain
Technology (CVCBT). IEEE, 2018, pp. 45–54.
[23] T. Laurence, Blockchain for dummies. John Wiley &
Sons, 2017.
[24] X. Decuyper, “How does a blockchain work,” Online,
2018, https://savjee.be/videos/simply-
explained/how-does-a-blockchain-work/.
[25] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L.
Maglaras, and H. Janicke, “Blockchain technologies
for the internet of things: Research issues and
challenges,” IEEE Internet of Things Journal, 2018.
[26] A. T. Norman, Blockchain Technology Explained: The
Ultimate Beginners Guide About Blockchain Wallet,
Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero,
Ripple, Dash, IOTA And Smart Contracts.

More Related Content

What's hot

Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologiesshashi712
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.Mangesh Vasu
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review AAKASH S
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Networkmdfarhanh1
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network drboon
 
Text compression
Text compressionText compression
Text compressionkrishnagd22
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorialtritv
 

What's hot (20)

Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
Text compression
Text compressionText compression
Text compression
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorial
 

Similar to IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings

Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturingN. A. Sutisna
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolIOSR Journals
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET Journal
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
IRJET- Review of Real Time Control of Launch Vehicles using Wireless Network
IRJET-  	  Review of Real Time Control of Launch Vehicles using Wireless NetworkIRJET-  	  Review of Real Time Control of Launch Vehicles using Wireless Network
IRJET- Review of Real Time Control of Launch Vehicles using Wireless NetworkIRJET Journal
 
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...IRJET Journal
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityIRJET Journal
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
 
Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2Easy n Inspire L
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study IRJET Journal
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 

Similar to IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings (20)

Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
 
B010130508
B010130508B010130508
B010130508
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
IRJET- Review of Real Time Control of Launch Vehicles using Wireless Network
IRJET-  	  Review of Real Time Control of Launch Vehicles using Wireless NetworkIRJET-  	  Review of Real Time Control of Launch Vehicles using Wireless Network
IRJET- Review of Real Time Control of Launch Vehicles using Wireless Network
 
Topology
TopologyTopology
Topology
 
Md ux mza5mtg=14
Md ux mza5mtg=14Md ux mza5mtg=14
Md ux mza5mtg=14
 
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
 
Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
A2546035115
A2546035115A2546035115
A2546035115
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1594 Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings Peter L. Fuhr1, Sterling S. Rooke2 1Oak Ridge National Laboratory, One Bethel Valley Road, Oak Ridge, Tennessee, 37831 USA 2University of Tennessee, Dept of Electrical Engineering and Computer Science, Knoxville, Tennessee, 37996, USA ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Mesh networking of wireless sensors implies that individual sensor nodes will be able to communicate with neighboring nodes thereby forming a communication fabric. In the case of traditional wireless sensors, their radio frequency coverage – or RF footprint – is defined by the maximum separation distance between neighboring nodes while still achieving some level of, typically degrading from maximum, information transfer (throughput). Security issues arise in the situations where the sensor nodes are deployed near the physical boundary of an industrial site (edge nodes). In the more general case of the sensors relying on omnidirectional antennas, the edge nodes’ RF footprint may extend beyond the edge of the facility. If the edge nodes perform as routing nodes, then it may be possible for similar sensors/devices outside of the facility boundary to join the network. While various schemes have been implemented to address this security issue, we report on the possibility of using blockchain for security of such edge nodes. Key Words: wireless sensors, mesh networking, blockchain 1. REAL DETAILS OF MESH NETWORKING IN AN INDUSTRIAL SETTING There is a vast amount of “how mesh networks work” information circulating in the literature ranging from marketing briefs to technical papers [1-7]. In the context of an industrial setting, it isn’t always so simple as to just move the wireless transmitters around to get better RF overlap while performing the measurement at a specific required plant location in order to provide useful information to the process engineer. A typical mesh network topological diagram is shown in Fig. 1. In the situation shown, each node is able to communicate with each other node. While Fig. 1 represents an idealized situation optimal for discussion purposes, indicating that each node can communicate with every other node, the reality is that this would require each node to project its RF signal over every other node. Assuming circular radiation patterns and that each wireless sensor transmits at the same power with identical omnidirectional antennas, then the associated RF footprint for this idealized situation is as shown in Fig. 2. Fig. 1. Typical mesh network diagram. Fig. 2. Requirement for mesh-networking communication of Fig. 1’s topology. While Figs. 1 and 2 show the RF footprint realities associated with wireless mesh networks1 , the reality of industrial wireless sensors operating in mesh network topologies is slightly different. Consider the following situation: as previously mentioned, the circles shown in Fig. 2 represent the idealized RF “footprint” of each radio- enabled device. The “canyons of metal” and general reflective surfaces found throughout an industrial or utility site can significantly vary the actual RF footprint from circular. The implications of the mesh requiring 1 …with identical omnidirectional antennas and radiated powers…
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1595 overlapping RF footprints for full-mesh-functionality and redundant information transport paths when such footprints may vary significantly from circular – and from each other – are, from an industrial deployment perspective: a fully-integrated mesh, as shown in Fig. 1 therefore requires a number of transmitters to be located in (relatively) close proximity. The more realistic deployment scenario involves a cloud or cluster of wireless field transmitters that are in communication with and controlled by a wireless gateway device. The gateway serves multiple roles, including: (1) coordinating the mesh routing table, (2) keeping track of the data transmission and network timing functions, (3) administering network security (frequently working with a companion security manager), and (4) administration of any frequency channel “blacklisting/whitelisting”. The practical situation is that as shown in Fig. 3 for a simple wireless sensor network consisting of a gateway and four nodes. Fig.3. Idealized RF footprint map for a mesh network gateway and four nodes. Similar to Figs. 1 and 2, the color-coded Fig. 3 diagram is meant to simply represent how the radio transceiver (Gateway/Node) must be within the RF footprint of its neighbors to be able to communicate with each other. In Fig. 3’s hypothetical topology, the Gateway can only communicate with Node #1 (for the Gateway lies within Node 1’s RF footprint). Similarly, Node #1 lies within the RF footprint of the Gateway, Node #2 and Node #4 – but not Node #3. Therefore, from an RF “coverage” and associated information transport perspective, Node #1 is able to relay messages from Nodes 2 and 4, but not Node #3. The associated mesh network connectivity diagram is shown in Fig. 4 - which is quite different from the idealized situation of Fig. 1. Fig. 4. The connectivity diagram for Fig. 1’s RF footprint coverage map. Please note that in this hypothetical deployment scenario, a non-robust communication network may encounter a catastrophic network failure if the link between the Gateway and Node #1 fails. The single-point of failure may be alleviated by repositioning the Gateway and/or the Nodes – a situation that an RF engineer may suggest, but that may not be feasible due to the actual locations of where the measurements are to be made. 2. Routing and Non-Routing Wireless Sensor Nodes As their name implies, routing sensor nodes have the dual capability of taking readings from their attached sensors as well as communicating with neighboring sensor nodes. In certain programmed activity, such a dual capability sensor node may be (via some process) appending its own sensor measurements with similar packetized data coming from those neighboring sensor nodes. While various protocols utilize methods for restricting neighboring nodes from “joining the network2 ” exist, the general requirement then devolves into each device either (a) possessing a table of allowed devices (nodes) or (b) communicating with the gateway providing “new” node information then receiving instructions as to if the “new” node should be allowed to join the network. This situation is depicted in Fig. 5. An alternative to this scenario of all nodes being routing nodes, is to have sensor nodes configured to function as non-routing nodes. In this configuration, such nodes do not possess the capability of serving as information pass- throughs, but simply provide sensor readings into the network. An alternative view of their performance is that they are the edge-of-the-network nodes and do not repeat or transport readings/information from any other node. The deployment scenario is that the non-routing nodes are positioned near the facility perimeter. Therefore, even though the RF footprint extends outside of the facility, the nodes simply do not repeat/relay/broadcast messages or information. Note that the routing and non-routing nodes must be deployed in a physical layout such that each non- 2 A common practice is the whitelisting of “allowed” devices.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1596 routing node may communicate with at least one routing node. This mixed-node deployment strategy places an extra burden on a facility’s maintenance and/or operations staff due to the need to not inadvertently placing a routing node where a non-routing node should be. Such a deployment scenario is illustrated in Fig. 6. A specific need for device authorization is depicted in Fig. 7 – an illustration of the Texas Ship Channel – where numerous companies operate side by side perhaps with similar systems from a single vendor. The use of non- routing nodes being deployed at the periphery of each facility – coupled with routing nodes’ deployment to ensure minimization of a node’s RF footprint extending beyond the facility perimeter – is required. Fig. 5. Sensors nodes capable of routing messages. Fig. 6. Non-routing nodes are (physically) deployed along the periphery of the facility. Fig. 7. Aerial view of the Texas (USA) ship channel where numerous industrial facilities are in close proximity to one another. Networks deployed at neighboring facilities will not “cross-talk” if non-routing nodes are deployed along the periphery of each facility.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1597 3. Provisioning of Mixed Routing & Non-Routing Edge Nodes Mesh networks exhibit various operational characteristics for data transport in RF/physical environments where the attenuation and multipath circumstances may vary. This requires that the nodes be capable of routing traffic from their neighbors (in accordance with the network algorithm being used). From an implementation perspective, this allows the maintenance crew to deploy the nodes where they need to be. But from a security perspective, this is not acceptable. This situation may be taken care of by proper settings inside the gateways (using unique IDs for each plants’ networks). The provisioning of devices being added to the sensor network is complex. Consider the provisioning state diagram, presented as Fig. 8, which illustrates the steps necessary to add/replace a sensor node. Note that this is a complex coordination of security keys being exchanged between the nodes and the gateway/controllers. 4. Blockchain for Sensor Validation The implementation of sensor nodes programmed with blockchain3 capabilities significantly reduces the deployment and provisioning complexities associated with the mix of routing and non-routing nodes. While a frequent use of blockchain/DLT is tracking information exchanges (transactions) [8-18], in this case of blockchain equipped sensor nodes, the blockchain is used for authentication of the nodes themselves. Such a process occurs for because device information is released to all members of the network through the distributed ledger and new information is updated in real-time, providing reliability and traceability of information [19-26]. Deployment of blockchain equipped sensor nodes removes the need for the two categories of sensor nodes: routing and non-routing for all devices are routing capable. The capability of a “new” node – such as a rogue node – to communicate with the network fabric is restricted by examination of the ledger itself. If a new node attempts to broadcast, the blockchain is queried as to if this new node is allowed to join the network. The deployment situation is illustrated in Fig. 9. The reduction in deployment – and cataloging – routing and non-routing sensor nodes’ locations eases the tasks for facility maintenance and operation. A single class of devices are used with network-centric (blockchain) validation of a device’s “permission” to join the network used. Devices that are “beyond-the-fence” are not authenticated into the network traffic flow and therefore inherently not a threat, leading to no need for routing/non-routing node distinction. 3 …or more formally distributed ledger technology (DLT)… 5. Summary The requirement to deploying a mixture of routing and non-routing wireless sensor nodes to address security issues that may arise due to RF footprints’ extending beyond a facility’s physical boundary leads to maintenance and operational impacts. The use of sensor nodes that may operate in a blockchain alleviates the deployment issues. 6. References [1] Y. Ai, M. Peng, and K. Zhang, “Edge computing technologies for internet of things: a primer,” Digital Communications and Networks, vol. 4, no. 2, pp. 77– 86, 2018. [2] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the internet of things: Security and privacy issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34–42, 2017. [3] R. Buyya and A. V. Dastjerdi, Internet of Things: Principles and paradigms. Elsevier, 2016. [4] A. Haroon, M. A. Shah, Y. Asim, W. Naeem, M. Kamran, and Q. Javaid, “Constraints in the iot: the world in 2020 and beyond,” Constraints, vol. 7, no. 11, 2016. [5] A. Musaddiq, Y. B. Zikria, O. Hahm, H. Yu, A. K. Bashir, and S. W. Kim, “A survey on resource management in iot operating systems,” IEEE Access, vol. 6, pp. 8459– 8482, 2018. [6] M. Conoscenti, A. Vetro, and J. C. De Martin, “Blockchain for the internet of things: A systematic literature review,” in Computer Systems and Applications (AICCSA), 2016 IEEE/ACS 13th International Conference of. IEEE, 2016, pp. 1–6. [7] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017. [8] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [9] I. Bashir, Mastering Blockchain. Packt Publishing Ltd, 2017. [10] W. Mougayar, The business Blockchain: promise, practice, and application of the next Internet technology. John Wiley & Sons, 2016. [11] J. wood, “Blockchain of things, cool things happen when iot and distributed ledger tech collide,” Online, 2018, https://medium.com/trivial-co/Blockchain- of-things-cool-things-happenwhen-iot-distributed- ledger-tech-collide-3784dc62cc7b.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1598 [12] Sun, J.; Yan, J.; Zhang, K.Z. Blockchain-based sharing services: What blockchain technology can contribute to smart cities. Financ. Innov. 2016, 2, 26. [13] Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. Fig. 8. State transition diagram showing various paths to joining a secured network. Fig. 9. Deployment scenario for blockchain-capable sensor nodes along the periphery of a facility.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1599 [14] Kraijak, S.; Tuwanut, P. A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends. In Proceedings of the 2015 IEEE 16th International Conference on Communication Technology, Hangzhou, China, 18–20 October 2015; pp. 26–31. [15] Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [16] Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: http://www.academia.edu/download/54517945/Bi tcoin_paper_Original_2.pdf (accessed on 3 May 2019). [17] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On blockchain and its integration with iot. challenges and opportunities,” Future Generation Computer Systems, 2018. [18] H. F. Atlam, A. Alenezi, M. O. Alassafi, and G. Wills, “Blockchain with internet of things: Benefits, challenges, and future directions,” International Journal of Intelligent Systems and Applications, vol. 10, no. 6, pp. 40–48, 2018. [19] Q. He, N. Guan, M. Lv, and W. Yi, “On the consensus mechanisms of blockchain/dlt for internet of things,” in 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES). IEEE, 2018, pp. 1–10. [20] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for iot security and privacy: The case study of a smart home,” in Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, 2017, pp. 618–623. [21] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things,” Ieee Access, vol. 4, pp. 2292–2303, 2016. [22] K. Wust and A. Gervais, “Do you need a blockchain ” in 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2018, pp. 45–54. [23] T. Laurence, Blockchain for dummies. John Wiley & Sons, 2017. [24] X. Decuyper, “How does a blockchain work,” Online, 2018, https://savjee.be/videos/simply- explained/how-does-a-blockchain-work/. [25] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras, and H. Janicke, “Blockchain technologies for the internet of things: Research issues and challenges,” IEEE Internet of Things Journal, 2018. [26] A. T. Norman, Blockchain Technology Explained: The Ultimate Beginners Guide About Blockchain Wallet, Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero, Ripple, Dash, IOTA And Smart Contracts.