Bald Eagle Search Optimized Deep CNN-Based Routing Scheme for WSN Using IoT-Based Blockchain Technology

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 2
Year of Publication : 2025
Authors : G. Sugitha, S. Maheswari, D. Karthikeyan, V. Asha
pdf
How to Cite?

G. Sugitha, S. Maheswari, D. Karthikeyan, V. Asha, "Bald Eagle Search Optimized Deep CNN-Based Routing Scheme for WSN Using IoT-Based Blockchain Technology," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 2, pp. 86-94, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I2P108

Abstract:

Wireless Sensor Networks (WSN) with changing environments are potentially vulnerable to various forms of threatening cyber-attacks, and they rely heavily on encryption and authentication techniques to tackle this problem. Because of the present changes in routing data, most prevalent routing algorithms face failure in characterizing harmful network nodes. Regarding the cybersecurity challenges of Internet of Things (IoT) devices, it’s a critical desire to identify novel approaches that improve the overall safety of WSNs. A problem that requires consideration is IoT device data storage and secure management. More existing determinations rely on a centralized framework, ecosystems are easy to interfere with, and data obtained from sensors are not authentic. Thus, this work presents a trustworthy and secure inter-correlated routing strategy that depends on the IoT-based blockchain, optimization algorithm, and deep learning techniques. The distributed routing data in the WSN is managed by the blockchain method, which achieves the best possible routing with the assistance of the Bald Eagle Search Optimization (BES) algorithm. The Deep Convolutional Neural Network (DCNN) algorithm makes effective routing decisions based on routing information variations among the nodes. The suggested routing strategy is carried out, and its efficacy is measured using latency, energy usage and throughput parameters. The suggested approach’s performance is enhanced to high efficiency, and it is evaluated for malicious attacks and delays.

Keywords:

WSN, IoT, BES algorithm, DCNN, Blockchain.

References:

[1] Jidian Yang et al., “A Trusted Routing Scheme using Blockchain and Reinforcement Learning for Wireless Sensor Networks,” Sensors, vol. 19, no. 4, pp. 1-19, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Sabir Hussain Awan et al., “BlockChain with IoT, an Emergent Routing Scheme for Smart Agriculture,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 4, pp. 420-429, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Ibrahim A. Abd El-Moghith, and Saad M. Darwish, “Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach,” IEEE Access, vol. 9, pp. 103822-103834, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] M. Revanesh, and Venugopalachar Sridhar, “A Trusted Distributed Routing Scheme for Wireless Sensor Networks using Blockchain and Meta-Heuristics-Based Deep Learning Technique,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Rekha Goyat et al., “A Secure Localization Scheme Based on Trust Assessment for WSNs using Blockchain Technology,” Future Generation Computer Systems, vol. 125, pp. 221-231, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Norah Saleh Alghamdi, and Mohammad Ayoub Khan, “Energy-Efficient and Blockchain-Enabled Model for Internet of Things (IoT) in Smart Cities,” Computers, Materials & Continua, vol. 66, no.3, pp. 2509-2524, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Mohammed Amin Almaiah, A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technology, Artificial Intelligence and Blockchain for Future Cybersecurity Applications, Springer International Publishing, pp. 217-234, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Saba Awan et al., “Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks,” Sensors, vol. 22, no. 2, pp. 1-24, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Khalid Haseeb et al., “Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things,” IEEE Access, vol. 7, pp. 185496-185505, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Saba Awan et al., “Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks,” Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Asan, Korea, pp. 96-107, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Hajra Zareen et al., “Blockchain and IPFS Based Service Model for the Internet of Things,” Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems, Asan, Korea, pp. 259-270, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Hao Liu et al., “Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking,” Security and Communication Networks, vol. 2021, no. 1, pp. 1-13, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Shahid Abbas et al., “Securing Genetic Algorithm Enabled SDN Routing for Blockchain Based Internet of Things,” IEEE Access, vol. 9, pp. 139739-139754, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Yuling Chen et al., “A Blockchain-Empowered Authentication Scheme for Worm Detection in Wireless Sensor Network,” Digital Communications and Networks, vol. 10, no. 2, pp. 265-272, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] S. Rajasoundaran et al., “Machine Learning Based Volatile Block Chain Construction for Secure Routing in Decentralized Military Sensor Networks,” Wireless Networks, vol. 27, no. 7, pp. 4513-4534, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Kuruva Lakshmanna et al., “Improved Metaheuristic-Driven Energy-Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks,” Sustainability, vol. 14, no. 13, pp. 1-19, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Tai-Hoon Kim et al., “A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks,” IEEE Access, vol. 7, pp. 184133-184144, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Weizhi Meng, Wenjuan Li, and Liqiu Zhu, “Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks,” IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1377-1386, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] M. Hema Kumar et al., “Real Time Two Hop Neighbour Strategic Secure Routing with Attribute Specific Blockchain Encryption Scheme for Improved Security in Wireless Sensor Networks,” International Journal of Computer Networks and Applications, vol. 8, no. 4, pp. 300-310, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] R.K. Yadav, and Rashmi Mishra, “An Authenticated Enrolment Scheme of Nodes using Blockchain and Prevention of Collaborative Blackhole Attack in WSN,” Journal of Scientific & Industrial Research, vol. 79, pp. 824-828, 2020.
[Google Scholar] [Publisher Link]
[21] M. Revanesh, and Venugopalachar Sridhar, “A Trusted Distributed Routing Scheme for Wireless Sensor Networks using Blockchain and Meta-Heuristics-Based Deep Learning Technique,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, 2021.
[CrossRef] [Google Scholar] [Publisher Link]