Journal of Machine and Computing


Blockchain-Enabled Security Enhancement for IoT Networks: Integrating LEACH Algorithm and Distributed Ledger Technology



Journal of Machine and Computing

Received On : 23 April 2024

Revised On : 28 October 2024

Accepted On : 05 December 2024

Volume 05, Issue 01


Article Views

Abstract


The rapid proliferation of Internet of Things (IoT) networks has significantly advanced various sectors such as smart cities, healthcare, and industrial automation, but it has also introduced substantial security challenges. Protecting data integrity, confidentiality, and availability in these networks is critical, yet traditional security measures often fall short due to the decentralized and resource-constrained nature of IoT devices. The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol, designed to optimize energy consumption in sensor networks, lacks intrinsic security features. To address these challenges, this paper proposes a novel approach that integrates LEACH with Distributed Ledger Technology (DLT), specifically blockchain. Blockchain’s decentralized and immutable ledger can enhance data security and integrity within IoT networks. The methodology involves modifying LEACH to incorporate blockchain for secure data transmission. In the clustering phase, LEACH forms clusters and designates a cluster head (CH) for data aggregation and transmission. Each CH maintains a local blockchain to log and verify data transactions within its cluster, using a consensus mechanism to ensure data integrity. Smart contracts are implemented to automate security policies and detect anomalies, while data encryption and digital signatures provide additional security layers. Simulations using the NS-3 simulator showed promising results: energy consumption was reduced by 18% compared to traditional LEACH, latency increased by 5% due to blockchain processing overhead, throughput improved by 12%, and security metrics indicated a 25% improvement in data integrity and a 30% reduction in successful attack attempts. In conclusion, integrating the LEACH algorithm with blockchain significantly enhances the security and efficiency of IoT networks. This approach leverages the energy optimization of LEACH and the robust security framework of blockchain, offering a scalable and secure solution for diverse IoT applications. Future research will focus on optimizing blockchain operations to reduce latency further and exploring the model's applicability in various IoT scenarios.


Keywords


Internet of Things (IoT), Low-Energy Adaptive Clustering Hierarchy (LEACH), Distributed Ledger Technology (DLT), Blockchain, Security, Data Integrity, Energy Efficiency, Smart Contracts, Consensus Mechanism, NS-3 Simulator.


  1. H. H. A. Emira, A. A. Elngar, and M. Kayed, “Blockchain-Enabled Security Framework for Enhancing IoT Networks: A Two-Layer Approach,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023, doi: 10.14569/ijacsa.2023.0141059.
  2. N. T. Y. Huan and Z. A. Zukarnain, “A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications,” IEEE Access, vol. 12, pp. 69765–69782, 2024, doi: 10.1109/access.2024.3378592.
  3. I. A. Ridhawi, M. Aloqaily, and F. Karray, “Intelligent Blockchain-Enabled Communication and Services: Solutions for Moving Internet of Things Devices,” IEEE Robotics & Automation Magazine, vol. 29, no. 2, pp. 10–20, Jun. 2022, doi: 10.1109/mra.2022.3163081.
  4. S. Showkat and S. Qureshi, “Securing the Internet of Things Through Blockchain Approach:Security Architectures, Consensus Algorithms, Enabling Technologies, Open Issues, and Research Directions,” International Journal of Computing and Digital Systems, vol. 13, no. 1, pp. 97–129, Jan. 2023, doi: 10.12785/ijcds/130109.
  5. Z. A. Khan, S. Amjad, F. Ahmed, A. M. Almasoud, M. Imran, and N. Javaid, “A Blockchain-Based Deep-Learning-Driven Architecture for Quality Routing in Wireless Sensor Networks,” IEEE Access, vol. 11, pp. 31036–31051, 2023, doi: 10.1109/access.2023.3259982.
  6. O. I. Khalaf and G. M. Abdulsahib, “Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks,” Peer-to-Peer Networking and Applications, vol. 14, no. 5, pp. 2858–2873, Mar. 2021, doi: 10.1007/s12083-021-01115-4.
  7. K. H. V. Prasad and S. Periyasamy, “Secure-Energy Efficient Bio-Inspired Clustering and Deep Learning-Based Routing Using Blockchain for Edge Assisted WSN Environment,” IEEE Access, vol. 11, pp. 145421–145440, 2023, doi: 10.1109/access.2023.3345218.
  8. S. Ismail, M. Nouman, D. W. Dawoud, and H. Reza, “Towards a lightweight security framework using blockchain and machine learning,” Blockchain: Research and Applications, vol. 5, no. 1, p. 100174, Mar. 2024, doi: 10.1016/j.bcra.2023.100174.
  9. K. M. Baalamurugan, P. P., N. Bacanin, K. Venkatachalam, S. S. Askar, and M. Abouhawwash, “RETRACTED ARTICLE: Blockchain-enabled K-harmonic framework for industrial IoT-based systems,” Scientific Reports, vol. 13, no. 1, Jan. 2023, doi: 10.1038/s41598-023-27739-5.
  10. H. A. Al-Ghuraybi, M. A. AlZain, and B. Soh, “Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems,” Multimedia Tools and Applications, vol. 83, no. 12, pp. 35629–35672, Sep. 2023, doi: 10.1007/s11042-023-16979-2.
  11. A. Ahmed, I. Parveen, S. Abdullah, I. Ahmad, N. Alturki, and L. Jamel, “Optimized Data Fusion With Scheduled Rest Periods for Enhanced Smart Agriculture via Blockchain Integration,” IEEE Access, vol. 12, pp. 15171–15193, 2024, doi: 10.1109/access.2024.3357538.
  12. A. Rehman et al., “Ensuring Security and Energy Efficiency of Wireless Sensor Network by Using Blockchain,” Applied Sciences, vol. 12, no. 21, p. 10794, Oct. 2022, doi: 10.3390/app122110794.
  13. V. L. Vinya, Y. Anuradha, H. R. Karimi, P. B. Divakarachari, and V. Sunkari, “A Novel Blockchain Approach for Improving the Security and Reliability of Wireless Sensor Networks Using Jellyfish Search Optimizer,” Electronics, vol. 11, no. 21, p. 3449, Oct. 2022, doi: 10.3390/electronics11213449.
  14. N. Rane, S. Choudhary, and J. Rane, “Leading-edge Artificial Intelligence (AI), Machine Learning (ML), Blockchain, and Internet of Things (IoT) technologies for enhanced wastewater treatment systems,” SSRN Electronic Journal, 2023, doi: 10.2139/ssrn.4641557.
  15. K. U. Rehman, S. Andleeb, M. Ashfaq, N. Akram, and M. W. Akram, “Blockchain-enabled smart agriculture: Enhancing data-driven decision making and ensuring food security,” Journal of Cleaner Production, vol. 427, p. 138900, Nov. 2023, doi: 10.1016/j.jclepro.2023.138900.
  16. R. M. Bhavadharini and S. Karthik, “Blockchain Enabled Metaheuristic Cluster Based Routing Model for Wireless Networks,” Computer Systems Science and Engineering, vol. 44, no. 2, pp. 1233–1250, 2023, doi: 10.32604/csse.2023.025461.
  17. A. Toubi and A. Hajami, “Data Manipulation in Wireless Sensor Networks: Enhancing Security Through Blockchain Integration with Proposal Mitigation Strategy,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 2, 2024, doi: 10.14569/ijacsa.2024.0150212.
  18. A. Rahman et al., “SmartBlock-SDN: An Optimized Blockchain-SDN Framework for Resource Management in IoT,” IEEE Access, vol. 9, pp. 28361–28376, 2021, doi: 10.1109/access.2021.3058244.
  19. M. B. E. Sajid, S. Ullah, N. Javaid, I. Ullah, A. M. Qamar, and F. Zaman, “Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1–16, Jan. 2022, doi: 10.1155/2022/7386049.

Acknowledgements


Author(s) thanks to aSSIST University for research lab and equipment support.


Funding


This paper is written with support for research funding from aSSIST University


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Taeyeon Oh, “Blockchain-Enabled Security Enhancement for IoT Networks: Integrating LEACH Algorithm and Distributed Ledger Technology”, Journal of Machine and Computing. doi: 10.53759/7669/jmc202505038.


Copyright


© 2025 Taeyeon Oh. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.