Submit Search
Upload
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings
•
0 likes
•
10 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i12/IRJET-V6I12280.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
Rahul Singh
Research Issues on WSN
Research Issues on WSN
Kathirvel Ayyaswamy
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
Vivek Maurya
Wireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
Adhoc wireless
Adhoc wireless
Ipsita Sharma
Adhoc network
Adhoc network
swatikamat
Unit8 tgb
Unit8 tgb
Vivek Maurya
Recommended
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
Rahul Singh
Research Issues on WSN
Research Issues on WSN
Kathirvel Ayyaswamy
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
Vivek Maurya
Wireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
Adhoc wireless
Adhoc wireless
Ipsita Sharma
Adhoc network
Adhoc network
swatikamat
Unit8 tgb
Unit8 tgb
Vivek Maurya
Adhoc technologies
Adhoc technologies
shashi712
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
Manet ns2
Manet ns2
vicent123
Advanced Networking on GloMoSim
Advanced Networking on GloMoSim
Kathirvel Ayyaswamy
Mobile Ad hoc network
Mobile Ad hoc network
Md. Mashiur Rahman
Adhoc Wireless Network
Adhoc Wireless Network
YunusKhan38
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
Mangesh Vasu
Wireless Mesh Network
Wireless Mesh Network
sheenammiddha
Hybrid wireless network -0th review
Hybrid wireless network -0th review
AAKASH S
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
Vinish Alikkal
Adhoc and routing protocols
Adhoc and routing protocols
shashi712
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
Sayed Chhattan Shah
Ad-Hoc Wireless Network
Ad-Hoc Wireless Network
mdfarhanh1
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
drboon
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
Kathirvel Ayyaswamy
Text compression
Text compression
krishnagd22
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
Chakravarthy Chittala
Wmn Tutorial
Wmn Tutorial
tritv
Chapter 8 the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
N. A. Sutisna
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
IRJET Journal
More Related Content
What's hot
Adhoc technologies
Adhoc technologies
shashi712
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
Manet ns2
Manet ns2
vicent123
Advanced Networking on GloMoSim
Advanced Networking on GloMoSim
Kathirvel Ayyaswamy
Mobile Ad hoc network
Mobile Ad hoc network
Md. Mashiur Rahman
Adhoc Wireless Network
Adhoc Wireless Network
YunusKhan38
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
Mangesh Vasu
Wireless Mesh Network
Wireless Mesh Network
sheenammiddha
Hybrid wireless network -0th review
Hybrid wireless network -0th review
AAKASH S
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
Vinish Alikkal
Adhoc and routing protocols
Adhoc and routing protocols
shashi712
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
Sayed Chhattan Shah
Ad-Hoc Wireless Network
Ad-Hoc Wireless Network
mdfarhanh1
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
drboon
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
Kathirvel Ayyaswamy
Text compression
Text compression
krishnagd22
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
Chakravarthy Chittala
Wmn Tutorial
Wmn Tutorial
tritv
What's hot
(20)
Adhoc technologies
Adhoc technologies
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Manet ns2
Manet ns2
Advanced Networking on GloMoSim
Advanced Networking on GloMoSim
Mobile Ad hoc network
Mobile Ad hoc network
Adhoc Wireless Network
Adhoc Wireless Network
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
Wireless Mesh Network
Wireless Mesh Network
Hybrid wireless network -0th review
Hybrid wireless network -0th review
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
Adhoc and routing protocols
Adhoc and routing protocols
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
Ad-Hoc Wireless Network
Ad-Hoc Wireless Network
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
Text compression
Text compression
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
Wmn Tutorial
Wmn Tutorial
Similar to IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings
Chapter 8 the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
N. A. Sutisna
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
IRJET Journal
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
IOSR Journals
B010130508
B010130508
IOSR Journals
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET Journal
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
IRJET Journal
IRJET- Review of Real Time Control of Launch Vehicles using Wireless Network
IRJET- Review of Real Time Control of Launch Vehicles using Wireless Network
IRJET Journal
Topology
Topology
AyuMohamad
Md ux mza5mtg=14
Md ux mza5mtg=14
editorijserin
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
IRJET Journal
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
IRJET Journal
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET Journal
Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2
Easy n Inspire L
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET Journal
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
IRJET Journal
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
ijsrd.com
A2546035115
A2546035115
Prafull Maktedar
Similar to IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings
(20)
Chapter 8 the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
B010130508
B010130508
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
IRJET- Review of Real Time Control of Launch Vehicles using Wireless Network
IRJET- Review of Real Time Control of Launch Vehicles using Wireless Network
Topology
Topology
Md ux mza5mtg=14
Md ux mza5mtg=14
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
IRJET- Measurement of Second Harmonic Voltage with Wavelength Modulation Spec...
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
A2546035115
A2546035115
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Online banking management system project.pdf
Online banking management system project.pdf
Kamal Acharya
result management system report for college project
result management system report for college project
Tonystark477637
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Prabhanshu Chaturvedi
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Recently uploaded
(20)
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Online banking management system project.pdf
Online banking management system project.pdf
result management system report for college project
result management system report for college project
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1594 Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless Sensor Network Topologies for Industrial Settings Peter L. Fuhr1, Sterling S. Rooke2 1Oak Ridge National Laboratory, One Bethel Valley Road, Oak Ridge, Tennessee, 37831 USA 2University of Tennessee, Dept of Electrical Engineering and Computer Science, Knoxville, Tennessee, 37996, USA ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Mesh networking of wireless sensors implies that individual sensor nodes will be able to communicate with neighboring nodes thereby forming a communication fabric. In the case of traditional wireless sensors, their radio frequency coverage – or RF footprint – is defined by the maximum separation distance between neighboring nodes while still achieving some level of, typically degrading from maximum, information transfer (throughput). Security issues arise in the situations where the sensor nodes are deployed near the physical boundary of an industrial site (edge nodes). In the more general case of the sensors relying on omnidirectional antennas, the edge nodes’ RF footprint may extend beyond the edge of the facility. If the edge nodes perform as routing nodes, then it may be possible for similar sensors/devices outside of the facility boundary to join the network. While various schemes have been implemented to address this security issue, we report on the possibility of using blockchain for security of such edge nodes. Key Words: wireless sensors, mesh networking, blockchain 1. REAL DETAILS OF MESH NETWORKING IN AN INDUSTRIAL SETTING There is a vast amount of “how mesh networks work” information circulating in the literature ranging from marketing briefs to technical papers [1-7]. In the context of an industrial setting, it isn’t always so simple as to just move the wireless transmitters around to get better RF overlap while performing the measurement at a specific required plant location in order to provide useful information to the process engineer. A typical mesh network topological diagram is shown in Fig. 1. In the situation shown, each node is able to communicate with each other node. While Fig. 1 represents an idealized situation optimal for discussion purposes, indicating that each node can communicate with every other node, the reality is that this would require each node to project its RF signal over every other node. Assuming circular radiation patterns and that each wireless sensor transmits at the same power with identical omnidirectional antennas, then the associated RF footprint for this idealized situation is as shown in Fig. 2. Fig. 1. Typical mesh network diagram. Fig. 2. Requirement for mesh-networking communication of Fig. 1’s topology. While Figs. 1 and 2 show the RF footprint realities associated with wireless mesh networks1 , the reality of industrial wireless sensors operating in mesh network topologies is slightly different. Consider the following situation: as previously mentioned, the circles shown in Fig. 2 represent the idealized RF “footprint” of each radio- enabled device. The “canyons of metal” and general reflective surfaces found throughout an industrial or utility site can significantly vary the actual RF footprint from circular. The implications of the mesh requiring 1 …with identical omnidirectional antennas and radiated powers…
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1595 overlapping RF footprints for full-mesh-functionality and redundant information transport paths when such footprints may vary significantly from circular – and from each other – are, from an industrial deployment perspective: a fully-integrated mesh, as shown in Fig. 1 therefore requires a number of transmitters to be located in (relatively) close proximity. The more realistic deployment scenario involves a cloud or cluster of wireless field transmitters that are in communication with and controlled by a wireless gateway device. The gateway serves multiple roles, including: (1) coordinating the mesh routing table, (2) keeping track of the data transmission and network timing functions, (3) administering network security (frequently working with a companion security manager), and (4) administration of any frequency channel “blacklisting/whitelisting”. The practical situation is that as shown in Fig. 3 for a simple wireless sensor network consisting of a gateway and four nodes. Fig.3. Idealized RF footprint map for a mesh network gateway and four nodes. Similar to Figs. 1 and 2, the color-coded Fig. 3 diagram is meant to simply represent how the radio transceiver (Gateway/Node) must be within the RF footprint of its neighbors to be able to communicate with each other. In Fig. 3’s hypothetical topology, the Gateway can only communicate with Node #1 (for the Gateway lies within Node 1’s RF footprint). Similarly, Node #1 lies within the RF footprint of the Gateway, Node #2 and Node #4 – but not Node #3. Therefore, from an RF “coverage” and associated information transport perspective, Node #1 is able to relay messages from Nodes 2 and 4, but not Node #3. The associated mesh network connectivity diagram is shown in Fig. 4 - which is quite different from the idealized situation of Fig. 1. Fig. 4. The connectivity diagram for Fig. 1’s RF footprint coverage map. Please note that in this hypothetical deployment scenario, a non-robust communication network may encounter a catastrophic network failure if the link between the Gateway and Node #1 fails. The single-point of failure may be alleviated by repositioning the Gateway and/or the Nodes – a situation that an RF engineer may suggest, but that may not be feasible due to the actual locations of where the measurements are to be made. 2. Routing and Non-Routing Wireless Sensor Nodes As their name implies, routing sensor nodes have the dual capability of taking readings from their attached sensors as well as communicating with neighboring sensor nodes. In certain programmed activity, such a dual capability sensor node may be (via some process) appending its own sensor measurements with similar packetized data coming from those neighboring sensor nodes. While various protocols utilize methods for restricting neighboring nodes from “joining the network2 ” exist, the general requirement then devolves into each device either (a) possessing a table of allowed devices (nodes) or (b) communicating with the gateway providing “new” node information then receiving instructions as to if the “new” node should be allowed to join the network. This situation is depicted in Fig. 5. An alternative to this scenario of all nodes being routing nodes, is to have sensor nodes configured to function as non-routing nodes. In this configuration, such nodes do not possess the capability of serving as information pass- throughs, but simply provide sensor readings into the network. An alternative view of their performance is that they are the edge-of-the-network nodes and do not repeat or transport readings/information from any other node. The deployment scenario is that the non-routing nodes are positioned near the facility perimeter. Therefore, even though the RF footprint extends outside of the facility, the nodes simply do not repeat/relay/broadcast messages or information. Note that the routing and non-routing nodes must be deployed in a physical layout such that each non- 2 A common practice is the whitelisting of “allowed” devices.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1596 routing node may communicate with at least one routing node. This mixed-node deployment strategy places an extra burden on a facility’s maintenance and/or operations staff due to the need to not inadvertently placing a routing node where a non-routing node should be. Such a deployment scenario is illustrated in Fig. 6. A specific need for device authorization is depicted in Fig. 7 – an illustration of the Texas Ship Channel – where numerous companies operate side by side perhaps with similar systems from a single vendor. The use of non- routing nodes being deployed at the periphery of each facility – coupled with routing nodes’ deployment to ensure minimization of a node’s RF footprint extending beyond the facility perimeter – is required. Fig. 5. Sensors nodes capable of routing messages. Fig. 6. Non-routing nodes are (physically) deployed along the periphery of the facility. Fig. 7. Aerial view of the Texas (USA) ship channel where numerous industrial facilities are in close proximity to one another. Networks deployed at neighboring facilities will not “cross-talk” if non-routing nodes are deployed along the periphery of each facility.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1597 3. Provisioning of Mixed Routing & Non-Routing Edge Nodes Mesh networks exhibit various operational characteristics for data transport in RF/physical environments where the attenuation and multipath circumstances may vary. This requires that the nodes be capable of routing traffic from their neighbors (in accordance with the network algorithm being used). From an implementation perspective, this allows the maintenance crew to deploy the nodes where they need to be. But from a security perspective, this is not acceptable. This situation may be taken care of by proper settings inside the gateways (using unique IDs for each plants’ networks). The provisioning of devices being added to the sensor network is complex. Consider the provisioning state diagram, presented as Fig. 8, which illustrates the steps necessary to add/replace a sensor node. Note that this is a complex coordination of security keys being exchanged between the nodes and the gateway/controllers. 4. Blockchain for Sensor Validation The implementation of sensor nodes programmed with blockchain3 capabilities significantly reduces the deployment and provisioning complexities associated with the mix of routing and non-routing nodes. While a frequent use of blockchain/DLT is tracking information exchanges (transactions) [8-18], in this case of blockchain equipped sensor nodes, the blockchain is used for authentication of the nodes themselves. Such a process occurs for because device information is released to all members of the network through the distributed ledger and new information is updated in real-time, providing reliability and traceability of information [19-26]. Deployment of blockchain equipped sensor nodes removes the need for the two categories of sensor nodes: routing and non-routing for all devices are routing capable. The capability of a “new” node – such as a rogue node – to communicate with the network fabric is restricted by examination of the ledger itself. If a new node attempts to broadcast, the blockchain is queried as to if this new node is allowed to join the network. The deployment situation is illustrated in Fig. 9. The reduction in deployment – and cataloging – routing and non-routing sensor nodes’ locations eases the tasks for facility maintenance and operation. A single class of devices are used with network-centric (blockchain) validation of a device’s “permission” to join the network used. Devices that are “beyond-the-fence” are not authenticated into the network traffic flow and therefore inherently not a threat, leading to no need for routing/non-routing node distinction. 3 …or more formally distributed ledger technology (DLT)… 5. Summary The requirement to deploying a mixture of routing and non-routing wireless sensor nodes to address security issues that may arise due to RF footprints’ extending beyond a facility’s physical boundary leads to maintenance and operational impacts. The use of sensor nodes that may operate in a blockchain alleviates the deployment issues. 6. References [1] Y. Ai, M. Peng, and K. Zhang, “Edge computing technologies for internet of things: a primer,” Digital Communications and Networks, vol. 4, no. 2, pp. 77– 86, 2018. [2] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the internet of things: Security and privacy issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34–42, 2017. [3] R. Buyya and A. V. Dastjerdi, Internet of Things: Principles and paradigms. Elsevier, 2016. [4] A. Haroon, M. A. Shah, Y. Asim, W. Naeem, M. Kamran, and Q. Javaid, “Constraints in the iot: the world in 2020 and beyond,” Constraints, vol. 7, no. 11, 2016. [5] A. Musaddiq, Y. B. Zikria, O. Hahm, H. Yu, A. K. Bashir, and S. W. Kim, “A survey on resource management in iot operating systems,” IEEE Access, vol. 6, pp. 8459– 8482, 2018. [6] M. Conoscenti, A. Vetro, and J. C. De Martin, “Blockchain for the internet of things: A systematic literature review,” in Computer Systems and Applications (AICCSA), 2016 IEEE/ACS 13th International Conference of. IEEE, 2016, pp. 1–6. [7] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017. [8] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [9] I. Bashir, Mastering Blockchain. Packt Publishing Ltd, 2017. [10] W. Mougayar, The business Blockchain: promise, practice, and application of the next Internet technology. John Wiley & Sons, 2016. [11] J. wood, “Blockchain of things, cool things happen when iot and distributed ledger tech collide,” Online, 2018, https://medium.com/trivial-co/Blockchain- of-things-cool-things-happenwhen-iot-distributed- ledger-tech-collide-3784dc62cc7b.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1598 [12] Sun, J.; Yan, J.; Zhang, K.Z. Blockchain-based sharing services: What blockchain technology can contribute to smart cities. Financ. Innov. 2016, 2, 26. [13] Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. Fig. 8. State transition diagram showing various paths to joining a secured network. Fig. 9. Deployment scenario for blockchain-capable sensor nodes along the periphery of a facility.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1599 [14] Kraijak, S.; Tuwanut, P. A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends. In Proceedings of the 2015 IEEE 16th International Conference on Communication Technology, Hangzhou, China, 18–20 October 2015; pp. 26–31. [15] Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [16] Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: http://www.academia.edu/download/54517945/Bi tcoin_paper_Original_2.pdf (accessed on 3 May 2019). [17] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On blockchain and its integration with iot. challenges and opportunities,” Future Generation Computer Systems, 2018. [18] H. F. Atlam, A. Alenezi, M. O. Alassafi, and G. Wills, “Blockchain with internet of things: Benefits, challenges, and future directions,” International Journal of Intelligent Systems and Applications, vol. 10, no. 6, pp. 40–48, 2018. [19] Q. He, N. Guan, M. Lv, and W. Yi, “On the consensus mechanisms of blockchain/dlt for internet of things,” in 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES). IEEE, 2018, pp. 1–10. [20] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for iot security and privacy: The case study of a smart home,” in Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, 2017, pp. 618–623. [21] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things,” Ieee Access, vol. 4, pp. 2292–2303, 2016. [22] K. Wust and A. Gervais, “Do you need a blockchain ” in 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2018, pp. 45–54. [23] T. Laurence, Blockchain for dummies. John Wiley & Sons, 2017. [24] X. Decuyper, “How does a blockchain work,” Online, 2018, https://savjee.be/videos/simply- explained/how-does-a-blockchain-work/. [25] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras, and H. Janicke, “Blockchain technologies for the internet of things: Research issues and challenges,” IEEE Internet of Things Journal, 2018. [26] A. T. Norman, Blockchain Technology Explained: The Ultimate Beginners Guide About Blockchain Wallet, Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero, Ripple, Dash, IOTA And Smart Contracts.
Download now