• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

    2022-03-14 09:27:50MohamedAliIbrahimAbdElMoghithMohamedElDeriniandSaadDarwish
    Computers Materials&Continua 2022年3期

    Mohamed Ali,Ibrahim A.Abd El-Moghith,Mohamed N.El-Derini and Saad M.Darwish,*

    1Higher Institute for Tourism,Hotels and Computer,Al-Seyouf,Alexandria,21533,Egypt

    2Department of Information Technology,Institute of Graduate Studies and Research,Alexandria University,21526,Egypt

    3Department of Computer and Systems Engineering,Faculty of Engineering,Alexandria University,Alexandria,21544,Egypt

    Abstract:Routing is a key function in Wireless Sensor Networks(WSNs)since it facilitates data transfer to base stations.Routing attacks have the potential to destroy and degrade the functionality of WSNs.A trustworthy routing system is essential for routing security and WSN efficiency.Numerous methods have been implemented to build trust between routing nodes,including the use of cryptographic methods and centralized routing.Nonetheless,the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities.At the moment,there is no effective way to avoid malicious node attacks.As a consequence of these concerns,this paper proposes a trusted routing technique that combines blockchain infrastructure,deep neural networks,and Markov Decision Processes(MDPs)to improve the security and efficiency of WSN routing.To authenticate the transmission process, the suggested methodology makes use of a Proof of Authority (PoA) mechanism inside the blockchain network.The validation group required for proofing is chosen using a deep learning approach that prioritizes each node’s characteristics.MDPs are then utilized to determine the suitable next-hop as a forwarding node capable of securely transmitting messages.According to testing data,our routing system outperforms current routing algorithms in a 50%malicious node routing scenario.

    Keywords: Wireless sensor networks; trusted routing; deep neural network;blockchain;markov decision

    1 Introduction

    The multi-hop routing mechanism is a fundamental component of WSN technology.Nonetheless,the dispersed and dynamic characteristics of WSN render multi-hop routing susceptible to a variety of attack patterns, compromising security [1].A malicious node may emit erroneous queue length information in order to increase the likelihood of receiving packets,hence altering the routing schedule of other routing nodes.Current routing algorithms have difficulty identifying such malicious nodes since it is difficult to distinguish between two routing nodes’real-time changes in routing information[2].When a malicious node receives data packets from a neighbor node,it discards them immediately rather than forwarding them to the next-hop neighbor node.This results in a data “black hole”in the network, which is difficult to detect in WSNs for routing nodes [3].These malicious nodes might be external attackers or legal internal nodes that have been intercepted by external attackers.Trust management has been a common method of assuring the routing network’s security in recent years.This approach enables the routing node to identify reasonably trustworthy routing connections efficiently.

    There have been a significant amount of study in recent years on blockchain technology and routing algorithms[4].The blockchain is a decentralized database that is maintained by several nodes and is essentially concerned with problems of trust and security.The blockchain relies on four critical technological features to deliver reliable and secure services that include distributed ledger,asymmetric encryption and authorization technique, the consensus method, and smart contracts.See [5,6] for different types of consensus methods.Proof of Authority (PoA) is a Byzantine consensus technique that is used for authorization and private blockchain technology[6].The method is based on a group of reputable entities(i.e.,authorities)referred to as validators.Validators gather,construct,and add blocks to the chain in response to consumer transactions.As a result,we must pay special attention to the selection of validators.

    Recent advances in reinforcement learning have enabled wireless nodes to watch and acquire information from their effective local operational environment, learn, and make efficient routing choices on the fly[6].A common decision-making strategy is to determine the optimal next-hop based on the present situation.Numerous academics have identified Markov Decision Systems(MDSs)as one of the most appropriate decision-making techniques for a random dynamic approach to solve this problem.Each hop in the routing process may be thought of as a state in this case, with each hop choosing one of the best hops.Then, by making consecutive judgments, messages may be sent effectively and securely to their destination[7].

    We present a novel trustworthy routing system for WSNs based on blockchains and MDS in this study.We use proof of authority inside the blockchain network to validate the node for the transmission phase.To do this, a deep neural network is employed to choose the salient nodes that represent the node-dependent validators’features.Through the attributes associated with each node,a deep-learning model augments the collection of validators.The technique leverages the decentralized,tamper-resistant,and traceable nature of blockchain transactions to increase the integrity of routing information across routing nodes.The MDPs model is used to assist routing nodes in making more informed routing choices and selecting the most dependable and efficient routing links.

    The rest of this article is as follows:Section 2 summarizes current strategies for a reliable routing method in WSNs.Section 3 discusses the suggested trustworthy routing model.Section 4 presents many experimental results that demonstrate the suggested model’s efficiency.Finally,in Section 5,we will conclude the paper and outline future goals.

    2 Related Work

    This section will discuss many established trustworthy routing solutions for enhancing route security and dependability.Following that, we discuss some relevant methods to blockchain development routing methods.Finally,we investigate existing systems that use MDP in order to make the appropriate decision about message delivery[8-20].By and large,all trust models in WSNs fall into two categories:central models and distributed models[21].The base station or a specialized trustable interface performs the action of aggregating and integrating the trust values of sensor nodes in central trust models.However, in distributed trust architectures, sensor nodes collect trust values on their own.Different approaches, technologies, and procedures for establishing trust have been suggested in WSNs, including fuzzy logic, probabilistic, and deterministic methodologies.The authors of [19]employed fuzzy logic to create a mechanism for evaluating trust in WSNs.The reputation values of nodes are used to calculate the reputation values of pathways in this manner.Then, for packet transmission,the route with the greatest reputation value is chosen.The fuzzy logic-based trust model is considered to be one of the core models; it should be mentioned that central models use a lot of energy.One advantage of fuzzy reasoning is that it is well-suited for very complicated systems whose actions are difficult to deduce.Additionally,the authors in[22]introduced a lightweight,low-energy adaptive hierarchy clustering technique for detecting suspicious node-to-node interactions.

    Numerous proposals have been made recently to create a robust spatial routing algorithm for a wireless sensor network that can identify and communicate data about an incident to the base station[23].The authors in[24]designed a safe routing protocol using hierarchical routing algorithms based on numerous criteria such as the distance between nodes and the base station,the distribution density of nodes,and the residual energy of nodes.In[25],the author proposed a secure communication and routing architecture based on the routing protocol’s security architecture.

    Several academics have recently combined the tamper-proof and traceable characteristics of blockchain technology with routing algorithms in order to improve the stability of routing nodes.The authors in[26]presented the trustworthy public key management framework.The method eliminated the need for central authentication and provide a decentralized inter-domain routing network by substituting a blockchain protocol for traditional public key infrastructures.In [27], a concurrent,multi-link blockchain-based communications network is created.The nodes may be classified as malicious or benign, depending on the methodology used to link the interrelated factors and the behavioral features of the blockchain-based data routing nodes.The authors in [28] developed a blockchain-based contractual routing system for networks with untrusted nodes using smart contracts.The critical principle is that the source node confirms the arrival of each hop routing to the smart contract, and malicious behavior nodes are recorded.The following packets will no longer pass through a malicious node that has been set up.A malicious node equipped with the token’s algorithm,on the other hand,may fraudulently report that the packets were received.As a result,there are safety concerns[29,30].

    As mentioned in [31], several studies have described a signal-to-noise ratio-based dynamic clustering-based routing system for wireless sensor networks.For the security of routing protocols,the authors used a cluster-based symmetric key cryptography technique.To address the problem in WSN, they created a unique bio-inspired trustworthy routing architecture combining ant colony optimization and Physarumautonomic optimization.The neighbor’s conduct was observed with the purpose of assessing trust, and trust-based information was obtained.Another group of academics in[32]published a comprehensive study on the energy-efficient encryption and decoding algorithms for various keys.The introduced mechanism is responsible for encryption and decryption utilizing the DES and RSA algorithms.The quality of channels in wireless sensor networks may be enhanced by encrypting the data using various keys.As described in [33-37], several authors suggested securing ad hoc on-demand distance vector, a secure routing protocol based on initial encryption that can withstand certain routing assaults while ensuring the integrity and acknowledgment of identification.Other authors introduced an energy-aware secure routing architecture that preserves a trusted environment,isolates misbehaving nodes,and has a minimal control cost.The authors devised an intrusiontolerant routing system for wireless sensor networks.Although a malicious node may compromise certain nodes in the close area,it cannot cause extensive network disruption.

    To protect data from eavesdropping assaults,several researchers have suggested a safe multipath routing protocol in sensor networks that use random network coding in directed diffusion routing.Current works addressed the issue of colluding and coordinated black hole attacks and suggested an approach that can be included in the ad hoc on-demand distance vector and secure ad hoc ondemand distance vector protocols.Numerous up-to-date papers have combined multipath routing with a feedback mechanism to identify nodes that lose packets and choose a different path for data transmission,therefore avoiding misbehaving nodes.The trust and energy-aware routing protocol is a safe routing framework that is based on three distinct frameworks and represents the trust value.The weighted trust and contributed residual energy are two of them,while the hop count is the third.A new trust model is predicted [37] that is built on message trust, data trust, and energy trust.The trustworthiness of data is determined by three factors: trust evaluation, fault tolerance, and data consistency.Energy trust identifies denial-of-service attacks by recognizing the node that spends the most energy in comparison to other nodes.

    Recent developments in MDP solvers have enabled the solution of large-scale structures and sparked interest in WSNs in the future.For example,the authors of[29]established a WSN-controlled transmission power-level routing protocol using MDPs.The chosen power source is chosen by determining the best strategy for the MDP setup.The authors in [30] presented past work that examined relay selection in WSNs using an MDP.Additionally,to selecting from the explored relay nodes,a transmitting node may choose to continue searching for other relay choices.The node selects the reward to be dispersed to accessible relays throughout the probing process.The states are the finest historical recompense,as well as the recompense for unproven relays in earlier levels.The MDP formulation is then solved using the Bellman equation.Different indicators, such as transmission latency,energy usage,and anticipated network congestion,might be considered while making a choice.For further information,see[29].

    To summarize, although the majority of secure protocols provide protection against replay and routing table poisoning attacks, they lack significant protection against black-hole attacks.Current blockchain-based routing systems rely on the proof of work concept to authenticate transactions(packets)in order to handle additional overhead.In comparison to previous protocols,the proposed approach utilizes proof of authority for authentication, which takes less computing time due to its reliance on a small number of key nodes (validators).The novelty here is the utilization of the deep neural network selecting the validators based on their node’s features.These validators are then utilized by MDP for choosing the secure path.

    3 The Proposed Framework

    The primary objective of this suggested method is to build a reliable,trustworthy routing protocol for wireless sensor networks by integrating deep chain and Markov decision-making to provide secured routing.The suggested scheme’s basic architecture is illustrated in Fig.1, and it is composed of three phases: building a node data structure, selecting a validator through a deep learning model,and optimizing the next hop via MDP.Each of these stages is discussed in depth in the following subsections.

    Figure 1:The proposed trusted routing scheme

    We assume in this paper that the blockchain network is either a trusted routing node or that it rejects packets delivered by other routing nodes.Malicious routing nodes may publish erroneous routing information to the routing network,such as queue length information,thus interfering with the routing scheduling process.Additionally, they may serve as black hole attack nodes, refusing to forward data.However,we exclude collusion attacks between two routing nodes in order to execute incorrect blockchain transactions.Additionally,we believe that a routing node may function solely as a normal or malicious node,implying that attacks are far from intermittent.Meanwhile,we disregard the sporadic aberrant behavior produced by the node’s performance (e.g., a node does not send a message in time or loses the wireless spectrum).Herein, the server nodes are often static, while the routing nodes may be dynamic.However,the entrance and departure of nodes have no effect on our scheme,since our blockchain-based system’s status information is likewise constantly updated.

    3.1 Step 1:Build Node Data Structure

    At first, all sensors operate in the same manner and serve no use as validators or slave nodes.They are not anonymous sensors;they have unique identification(e.g.,anonymous addresses).Each packet in the transmission is the same size.There are two types of data transmission in a wireless sensor network:direct transmission and multi-hop data transfer.Multi-hop data transfer is utilized in this instance.With symmetrical communication, each cell in the WSN starts with the same amount of energy and remains static.During initialization, the function of any node that is originally set to un-state is converted into the validator or minion.Each node in the network maintains a data structure including a variety of information on the node property,such as the chosen action(validator or not),the energy level,the coverage,the connectivity,and the number of its neighbors.For more information,see[38].

    3.2 Step 2:Validators Election Using Deep Neural Learning

    After establishing the data structure for each node,the characteristics of these nodes are utilized to determine the most significant nodes that will act as validators in the blockchain-proof framework’s authentication network.A deep neural network is used to make the selection.Deep learning techniques are used to learn functional hierarchies,in which features are constructed on higher levels using minor levels.The activation potentials supplied by each of the first hidden layer’s unique input measurements are utilized to choose the most appropriate functions.The features are selected to provide more accurate classifications than the high-dimensional initial characteristics.The stacked RBMS (Deep Belief Network)is used as a BlackBox with its default settings in this paper.For more information,see[17,39,40].This optimization problem is also sometimes termed empirical risk minimization.After completing this step, the selected nodes will be determined which will be used in blockchain-based routing networks.These selected nodes will be acted as validators and routing nodes.

    3.3 Step 3:Blockchain-Based Routing Networks

    To increase the trustworthiness and robustness of routing information, we integrate the blockchain, which is essentially a distributed ledger with tamper-proof, decentralization, and information traceability characteristics, into the wireless sensor network and use blockchain token transactions to record node-related information [41-47].The primary structure is composed of two components:the routing network itself and the blockchain network.Packets are sent from the source terminal to the destination terminal through a routing node,which then chooses the next-hop routing node based on the routing policy received from MDPs.The MDP requests and gathers pertinent routing network status information from the blockchain network on a continuous basis.The packets will be sent to the target routing node and subsequently to the destination terminal after continuous transmission.Each blockchain system uses a unique consensus method to guarantee the transaction’s fairness.We picked the PoA consensus method for our blockchain network because it is more efficient at processing transactions.Two distinct types of entities are specified in our concept for the PoA-based blockchain network.

    Validator: validators are pre-authenticated nodes on the blockchain that have advanced authorization and are in charge of the PoA Blockchain’s verification job.Their particular responsibilities include the execution of smart contracts,the verification of blockchain transactions,and the release of blockchain blocks.As described in step 2, a new validator may be introduced via the election of verified validators through a deep belief network.Even if a malicious validator exists,it is limited to attacking one of the contiguous blocks,at which time the malicious validator may be thrown out by other validator votes.

    Minion: minions are fewer privileged nodes that are unable to conduct verification work in the PoA blockchain as validators.Each routing node in our system is likewise a minion with fewer privileges on the PoA blockchain,and it also has a unique blockchain address.They may start token contracts,activate certain contract functionalities,and access the blockchain for transaction details.

    On the blockchain network,we utilize various blockchain tokens to represent the various packets that need to be sent to target nodes, withnunit tokens representingnunit related packets.The essence of a token is that it is a representation of the digitized data included in the smart contract’s associated packets.Token contracts may be initiated by routing nodes to create tokens and map the state information of associated packets.They will exchange tokens through the token contract in order to transfer tokens depending on the transmitted and received packets.The consensus method between server nodes prevents malicious nodes from revising the token transactions arbitrarily; to some degree, the token properly reflects the packet transmitted between the routing nodes.After joining the blockchain-based routing network, each routing node is registered on the registration contract.When the routing node gets data from its offspring,it forwards the packets and drops the data.However, in the case of the blockchain next-hop routing node, the system must validate the routing information on the blockchain,which includes the address of the next-hop routing node,the number of packets delivered to the next node, and the timestamp.The routing information is then verified and updated on the blockchain by the server nodes through the blockchain consensus process.The proposed approach is consistent with the idea described in [1] about the implementation of a blockchain-based routing network.

    3.4 Step 4:Next Hope Selection Using MDPS

    MDP is used to determine the optimum strategy for maximizing a value function,which is defined as the expected sum of rewards at all decision epoch’s infinite horizon issues,or as the anticipated total discounted reward or the expected average reward in infinite horizon problems[40].When using MDP theory to opportunistic routing,the following issues must be considered:how the state is defined and how the choice is made.In general,the process of packet forwarding from one node to another may be thought of as a state change.Due to the fact that the packet must reach the target node in the fewest feasible hops,we examine only the finite horizon scenario;therefore,the set of decision epochs is represented byT= {0, 1, 2,...,M}.S={ 1, 2,...,N}.Nis the state space, with system stateidefined as the ID of the node to which the packet belongs at a decision epocht.A packet produced by the source node is sent to the destination node through many hops,which implies that the initial state(any node in the network)passes through several stages to reach the termination state,which in this case an absorption state is matching to the destination node.

    Following that,we examine what actions are possible when the system’s state at decision epochtisi.In opportunistic routing,suitable candidate forwarders should be chosen from among neighbors and prioritized from the sender’s perspective.However,from the receiver’s perspective(the candidate nodes that received the packet),a coordinate mechanism is required to determine whether or not to transmit the packet in response to other nodes’replies.The article makes the assumption that a flawless coordination mechanism is utilized between the candidate nodes, i.e., that packets are sent in exact accordance with the candidate nodes’priorities.As a result,we examine just the former choice scenario,in which the accessible action space consists of all potential ordered subsets of the sender’s neighbor node-set.See[40]for more information regarding the steps of building MDP.

    The key question of WSN routing is how best to find the next step in every hop.As mentioned in the literature, the key impacts on next-hop decision-taking involve trust, congestion probability and distance to the target”.Readers looking for more information regarding how to compute these factors can refer to[39].The optimal next step is a standard decision-making mechanism focused on the current circumstances, and we are implementing MDPs to address the issue as it is one of the better choices for a random dynamical system.Any hop on the route can be seen as a state; each hop is determined to pick one of the next best hops.The decision-making in each stage relies on the current scenario, and the entire routing method is efficient in chain decisions.Because hops are not infinite from source to destination,we follow a final Markov decision to solve it.The simple principle is that to find a sequence of better hops by candidates; we must use optimal decision metrics in the routing process as a criterion for the decisions to construct a Finite Markov Decision control system.As the network of the wireless sensor is a global network, central computation does not appeal to accomplish one path.Every node is,therefore,responsible for measuring and making decisions in any hop.Thereby,we find the decision of next-hop as a one-phase decision-making process;the purpose of the decision is to optimize the reward for each move.

    4 Experimental Results

    We constructed a prototype and compared its performance to that of existing state-of-the-art reinforcement learning-based routing algorithms, the trust-based algorithm, and the blockchainbased algorithm.We compared our system to a standard PoW-based blockchain system to determine our system’s performance in terms of latency, consumption, and throughput.We created a PoA consortium blockchain and simulated a single server that would update the chain’s transactions.The MDPs may receive all of the routing information they needed from public blockchain transactions.The consortium blockchain was developed using Solidity 0.8.4 to ensure the integrity of Ethereum transactions.We used the blockchain-based routing algorithm as a performance test[1].To replicate actual packet arrival rates, we use the same setup as in [1], with 32 terminals in a 16×16 matrix randomly broadcasting packets to the destination point using a Poisson distribution with one packet per slot.

    Additionally, we simulated 16 ×16 routing nodes that were capable of receiving and delivering actual packets in a maximum of one packet/slot depending on the routing strategy given by the MDPs model.Finally,the experiment collected data on average packet latency,transaction latency,and energy usage.In the experiments,there were 25%and 50%malicious nodes in the 16×16 routing nodes.The malicious nodes attempted to manufacture fake queue length information and use the BP algorithm weakness to cheat more packets or function as a black hole node and broadcast no packets.The server node equipment is configured as follows:CPU 2.6 GHz,RAM 16 GB,Storage 1 TB,Network 1000 Mb,OS Ubuntu Server 19.04.Whereas the sensor node devices’detailed configurations are as follows:CPU 1.2 GHz,RAM 1 GB,Storage 16 TB,Network 100 Mb,OS TinyOS Alliance 2.1.2.

    4.1 Experiment 1:Comparative Analysis-Routing with Malicious Nodes

    To understand whether malicious nodes may alter the routing scheduling algorithms, we ran an experiment that compared the Trust-based backpressure algorithm (TB-BP), the QLearning backpressure algorithm (QL-BP), and the Reinforcement learning and blockchainbased algorithm (RLBC) to our system.For further information on the comparative methodologies, see [1].The comparison studies show that our method outperformed TB-BP, QL-BP,RLBC, and RLBC in the malicious routing environment as a function of packet arrival rate and average latency.As seen in Fig.2, our technique outperforms the TB-BP method in a routing environment with 25% malicious nodes, saving about 74% of the time when compared to the TB-BP method, 58% when compared to the QL-BP methodology, and 21% when compared to the RLBC methodology.Additionally, we conducted comparative experiments in a routing environment with 50% malicious routing nodes (see Fig.3) and discovered that it reduces delay by approximately 82% when compared to the TB-BP algorithm, 66% when compared to the QL-BP algorithm,and 28%when compared to the RLBC algorithm.

    Figure 2:Average delay of packets with 25%malicious nodes

    The experimental results demonstrate that our technique is not sensitive to malicious node impact in terms of average packet delay, and its efficacy demonstrates that it is conceivable to utilize it to enhance the routing algorithm’s performance.While both the proposed system and the RLBC algorithm rely on the blockchain network to determine trust nodes and are based on the PoA algorithm,the comparative system identifies validators randomly,in contrast to the proposed system,which selects validators using deep learning(PoA-DL),which has the effect of determining the best trust nodes for paths that are not exposed to at least one attack.

    4.2 Experiment 2:System Efficiency with PoA-DL

    In the second set of experiments, we compared our blockchain system based on the PoA-DL consensus mechanism, which employs deep learning to determine validators, to a traditional PoAbased blockchain system, which employs a random selection of validators, and to a traditional PoW-based blockchain system.Throughout the investigation, we captured experimental data such as transaction delay and throughput.We used transaction packaging time as a proxy for average token transaction delay.We measured the latency of token transactions on PoA-DL,PoA,and PoW blockchain systems as the arrival rate increased.The results of the experiment are shown in Fig.4.

    Figure 3:Average delay of packets with 50%malicious nodes

    Figure 4:Average transaction latency for both PoA and PoW-based blockchain systems

    As can be seen from Fig.4,the transaction’s latency is pretty steady and does not vary much with the arrival rate.Our PoA-DL blockchain system had an average transaction latency of roughly 0.24 milliseconds, whereas the PoA blockchain system had an average transaction delay of roughly 0.32 milliseconds.Whereas the PoW blockchain technology has a latency of roughly 0.55 ms.Results indicate that our blockchain system,which is based on the PoA-DL consensus mechanism,can reduce around 25% and 56% of transaction delay, respectively, when compared to PoA and PoW.Such a delay in token transactions is acceptable since it has a negligible effect on the routing schedule.It is both feasible and efficient to gather and maintain routing scheduling information using our PoADL blockchain solution.The proposed approach is efficient since the most secure nodes are chosen by applying deep learning methods to choose the best validators.Later, these nodes will be utilized by MDP to determine the optimal routing route; since there is no risk of assaulting these nodes,transaction latency will be decreased.

    4.3 Experiment 3:Token Transaction Throughput with POA-DL

    The final set of experiments validated the proposed trusted routing scheme’s efficiency in terms of token transaction throughput.The throughput of token transactions demonstrates the blockchain system’s capacity to manage concurrent token transactions.The results in Fig.5 demonstrate that as the rate of synchronous requests grows,the token transaction throughput climbs steadily,and the curve gradually flattens out as the throughput reaches its peak.The token transaction throughput of our blockchain system using the PoA-DL consensus mechanism is stable at 3630 concurrent requests per second,while the symbolic transaction throughput of the RLBC comparative system using the PoA consensus mechanism is stable at 3,300 concurrent requests per second, and the classic blockchain system using the PoW consensus mechanism is only stable at around 1,500 concurrent requests per second.The experimental results demonstrate that the PoA-DL-based method has a more efficient transaction processing capacity while dealing with concurrent searches due to the restricted number of validators.It is appropriate and legitimate to use the PoA-DL algorithm as the blockchain system’s consensus mechanism.This PoA-DL blockchain-based routing scheduling technique is capable of successfully coping with the routing environment’s high concurrent request volume.

    Figure 5:Throughput of transaction token for both PoA-DL,PoA and PoW-based blockchain systems

    Due to the fact that the proposed model uses MDP for routing rather than reinforcement learning as in[1],the solution of an MDP model referred to as a policy,may be implemented using a routing lookup table.This table may be easily saved in the sensor node’s memory for online operations.As a result, the MDP model can be applied to even the smallest and most resource-constrained nodes without requiring excessive computation.Additionally, near-optimal solutions may be constructed to approach optimum decision policies, allowing for the creation of WSN algorithms that are less computationally intensive[28].The reinforcement learning-based routing,on the other hand,is based on modifying the weight matrix to attain the required performance.In general,constructing an ideal weight matrix is a difficult task that is often solved by trial and error.To summarize,using MPD for routing improves the model’s transaction throughput[18].

    5 Conclusions and Future Work

    We proposed a trusted routing technique in this research that enhances the routing network’s performance by integrating deep blockchain and Markov decision processes.The routing packets are represented by the blockchain token, and each routing transaction is validated by validator nodes prior to being disseminated to the blockchain network.By ensuring the traceability and immutability of each routing transaction tracker, routing nodes will be able to monitor dynamic and trustworthy routing information on the blockchain network.Additionally,we build the MDP architecture in such a way that routes are discovered quickly and connections to hostile nodes are avoided.Our test results indicate that our schema is capable of rapidly eliminating hostile node attacks, and the device has exceptionally low latency.We want to use our method in the future to evaluate the effectiveness and portability of other route scheduling strategies to the backpressure technique.Additionally,we aim to include blockchain-based data validation tools.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产片内射在线| 12—13女人毛片做爰片一| 高潮久久久久久久久久久不卡| 久久人妻av系列| 免费久久久久久久精品成人欧美视频| 黑人欧美特级aaaaaa片| 午夜久久久在线观看| 伦理电影免费视频| 在线国产一区二区在线| 757午夜福利合集在线观看| 国产精品亚洲一级av第二区| 日韩精品青青久久久久久| 天天躁狠狠躁夜夜躁狠狠躁| 男人舔女人下体高潮全视频| 亚洲精品国产精品久久久不卡| 欧美日本中文国产一区发布| 久久精品国产亚洲av高清一级| 亚洲国产欧美一区二区综合| 一进一出抽搐动态| 午夜久久久久精精品| 真人做人爱边吃奶动态| 美国免费a级毛片| 侵犯人妻中文字幕一二三四区| 人妻丰满熟妇av一区二区三区| 亚洲精品国产一区二区精华液| 天堂影院成人在线观看| 麻豆一二三区av精品| 久久久久国产精品人妻aⅴ院| 一级a爱视频在线免费观看| 性欧美人与动物交配| 级片在线观看| 欧美大码av| 亚洲国产中文字幕在线视频| 欧美一级a爱片免费观看看 | 首页视频小说图片口味搜索| 精品国产乱子伦一区二区三区| 黄色毛片三级朝国网站| 久热爱精品视频在线9| 亚洲成人久久性| 午夜影院日韩av| 精品乱码久久久久久99久播| 日日干狠狠操夜夜爽| 一边摸一边抽搐一进一小说| 国产成人一区二区三区免费视频网站| 校园春色视频在线观看| 国产激情欧美一区二区| 天天一区二区日本电影三级 | 亚洲av成人av| 国产精品久久久久久人妻精品电影| 日韩一卡2卡3卡4卡2021年| 中文字幕久久专区| 老熟妇仑乱视频hdxx| 日韩欧美三级三区| 欧美成人一区二区免费高清观看 | 少妇被粗大的猛进出69影院| 国产一区二区在线av高清观看| 91av网站免费观看| tocl精华| 一卡2卡三卡四卡精品乱码亚洲| 两个人看的免费小视频| 人人澡人人妻人| 窝窝影院91人妻| 黄频高清免费视频| 免费在线观看日本一区| 天天添夜夜摸| 欧美+亚洲+日韩+国产| 日韩欧美在线二视频| av视频在线观看入口| 男人舔女人的私密视频| 久久久久久久久免费视频了| 成熟少妇高潮喷水视频| 久9热在线精品视频| 欧美激情极品国产一区二区三区| 国产精品电影一区二区三区| 亚洲一卡2卡3卡4卡5卡精品中文| 宅男免费午夜| 亚洲专区中文字幕在线| 久久影院123| 久久中文字幕人妻熟女| 伊人久久大香线蕉亚洲五| 成人欧美大片| 高清毛片免费观看视频网站| 精品国产美女av久久久久小说| 亚洲精品av麻豆狂野| 18禁美女被吸乳视频| 国产精品香港三级国产av潘金莲| 亚洲中文日韩欧美视频| 自拍欧美九色日韩亚洲蝌蚪91| 欧美成人一区二区免费高清观看 | 日日干狠狠操夜夜爽| 亚洲中文日韩欧美视频| 男女之事视频高清在线观看| 亚洲中文字幕日韩| 亚洲色图av天堂| 纯流量卡能插随身wifi吗| 亚洲成人精品中文字幕电影| 在线天堂中文资源库| 色精品久久人妻99蜜桃| 久久久精品国产亚洲av高清涩受| 成人三级做爰电影| 夜夜躁狠狠躁天天躁| 中文字幕高清在线视频| 50天的宝宝边吃奶边哭怎么回事| 麻豆成人av在线观看| 黑人巨大精品欧美一区二区蜜桃| 一区二区日韩欧美中文字幕| 亚洲av电影在线进入| 丝袜人妻中文字幕| 免费高清在线观看日韩| 日韩欧美免费精品| 国产熟女午夜一区二区三区| 中文字幕最新亚洲高清| 熟妇人妻久久中文字幕3abv| 亚洲成人久久性| 男女做爰动态图高潮gif福利片 | 香蕉久久夜色| 国产精品1区2区在线观看.| 久热爱精品视频在线9| 老汉色∧v一级毛片| 在线视频色国产色| 日韩欧美一区二区三区在线观看| 欧美黄色片欧美黄色片| 一个人观看的视频www高清免费观看 | 久久精品影院6| 国产精品久久久久久人妻精品电影| 18禁黄网站禁片午夜丰满| 婷婷丁香在线五月| 国产片内射在线| 又黄又爽又免费观看的视频| 97碰自拍视频| 亚洲成av片中文字幕在线观看| 欧美成人性av电影在线观看| 女性生殖器流出的白浆| 国产免费男女视频| 无人区码免费观看不卡| 午夜福利,免费看| 91字幕亚洲| 在线观看www视频免费| 亚洲在线自拍视频| 精品国产乱子伦一区二区三区| 性少妇av在线| 欧美日韩福利视频一区二区| 丝袜人妻中文字幕| 国产高清有码在线观看视频 | а√天堂www在线а√下载| 亚洲av五月六月丁香网| 国产精品久久视频播放| 久久久水蜜桃国产精品网| 国产精品av久久久久免费| 亚洲熟妇中文字幕五十中出| √禁漫天堂资源中文www| 亚洲av成人av| 美女免费视频网站| 99久久久亚洲精品蜜臀av| 一级a爱视频在线免费观看| 免费观看人在逋| 久久国产精品影院| 亚洲国产精品久久男人天堂| 最新在线观看一区二区三区| xxx96com| 色播在线永久视频| 一级作爱视频免费观看| 欧美av亚洲av综合av国产av| 国产单亲对白刺激| 亚洲av电影不卡..在线观看| 在线国产一区二区在线| 好男人电影高清在线观看| 欧美老熟妇乱子伦牲交| 人成视频在线观看免费观看| 性欧美人与动物交配| 国产精品野战在线观看| 色在线成人网| 亚洲性夜色夜夜综合| 啦啦啦观看免费观看视频高清 | 嫩草影院精品99| 人妻久久中文字幕网| 人人妻人人澡人人看| 日本vs欧美在线观看视频| 美女扒开内裤让男人捅视频| 最近最新中文字幕大全电影3 | 亚洲午夜精品一区,二区,三区| 亚洲成a人片在线一区二区| 亚洲三区欧美一区| 黄频高清免费视频| 国产欧美日韩一区二区三区在线| 亚洲精品国产精品久久久不卡| 女警被强在线播放| 午夜福利成人在线免费观看| 亚洲精品在线美女| 国产精品九九99| 久久久国产成人免费| 黑人操中国人逼视频| 亚洲三区欧美一区| 亚洲 欧美 日韩 在线 免费| 一级毛片女人18水好多| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美日本中文国产一区发布| 中文字幕人妻丝袜一区二区| 久久国产精品男人的天堂亚洲| 午夜福利一区二区在线看| 久久久久久久午夜电影| 亚洲精品久久国产高清桃花| 国产区一区二久久| 级片在线观看| 成年女人毛片免费观看观看9| 中国美女看黄片| 欧美日韩亚洲综合一区二区三区_| 999久久久精品免费观看国产| 久久热在线av| 亚洲人成电影观看| 欧美在线一区亚洲| 久久精品国产亚洲av高清一级| 波多野结衣av一区二区av| 国产亚洲精品第一综合不卡| 亚洲美女黄片视频| 欧美亚洲日本最大视频资源| 91精品国产国语对白视频| 人妻久久中文字幕网| 久99久视频精品免费| 色精品久久人妻99蜜桃| 亚洲色图 男人天堂 中文字幕| 91国产中文字幕| 免费av毛片视频| 在线十欧美十亚洲十日本专区| 美女扒开内裤让男人捅视频| 性欧美人与动物交配| 亚洲欧洲精品一区二区精品久久久| 亚洲九九香蕉| 大型av网站在线播放| 精品一区二区三区四区五区乱码| 91老司机精品| 色婷婷久久久亚洲欧美| 久久青草综合色| 黄色视频不卡| 色综合亚洲欧美另类图片| 成在线人永久免费视频| 国产色视频综合| bbb黄色大片| 最新在线观看一区二区三区| 免费在线观看亚洲国产| 国产精品美女特级片免费视频播放器 | 一级a爱片免费观看的视频| 一区二区三区激情视频| 欧美一区二区精品小视频在线| 国产精品国产高清国产av| 好看av亚洲va欧美ⅴa在| 亚洲欧美日韩高清在线视频| 精品久久久久久久久久免费视频| 日韩大尺度精品在线看网址 | 伦理电影免费视频| 亚洲成人国产一区在线观看| 久久精品国产亚洲av香蕉五月| 午夜精品在线福利| 91麻豆精品激情在线观看国产| 波多野结衣av一区二区av| 变态另类成人亚洲欧美熟女 | 国产成人av激情在线播放| 国产欧美日韩综合在线一区二区| 欧美日韩乱码在线| 国产欧美日韩综合在线一区二区| 黑人欧美特级aaaaaa片| 曰老女人黄片| 在线观看一区二区三区| av超薄肉色丝袜交足视频| 黄色视频,在线免费观看| 日本免费a在线| 国产成人av教育| av天堂久久9| 亚洲国产精品合色在线| 国产三级在线视频| 国产一区二区三区在线臀色熟女| 亚洲成av人片免费观看| 国产精品 欧美亚洲| 91在线观看av| 亚洲国产欧美日韩在线播放| 亚洲激情在线av| 国产真人三级小视频在线观看| 久久精品国产清高在天天线| 日韩欧美三级三区| 淫秽高清视频在线观看| 91国产中文字幕| 色尼玛亚洲综合影院| 精品久久久久久久人妻蜜臀av | 母亲3免费完整高清在线观看| 国产精品久久久久久人妻精品电影| 精品熟女少妇八av免费久了| 欧美久久黑人一区二区| 精品久久久精品久久久| 亚洲国产欧美日韩在线播放| 19禁男女啪啪无遮挡网站| 黄片大片在线免费观看| 男人的好看免费观看在线视频 | 丰满人妻熟妇乱又伦精品不卡| 两个人看的免费小视频| 曰老女人黄片| 成人三级黄色视频| 国产精品精品国产色婷婷| 日本vs欧美在线观看视频| 亚洲午夜理论影院| 国产伦人伦偷精品视频| 给我免费播放毛片高清在线观看| 国内久久婷婷六月综合欲色啪| 久久 成人 亚洲| 精品国产超薄肉色丝袜足j| 男女做爰动态图高潮gif福利片 | 国产成人精品在线电影| 好男人在线观看高清免费视频 | 成人18禁在线播放| 国产99久久九九免费精品| 最近最新中文字幕大全电影3 | 欧美成狂野欧美在线观看| 国产精品 欧美亚洲| 亚洲精品一卡2卡三卡4卡5卡| 色综合亚洲欧美另类图片| 亚洲黑人精品在线| aaaaa片日本免费| 男男h啪啪无遮挡| 成人国产一区最新在线观看| 岛国视频午夜一区免费看| 免费搜索国产男女视频| 国产麻豆成人av免费视频| 超碰成人久久| 精品一品国产午夜福利视频| 一区在线观看完整版| 窝窝影院91人妻| 女人被躁到高潮嗷嗷叫费观| 欧美日韩中文字幕国产精品一区二区三区 | 天天添夜夜摸| 久久精品国产99精品国产亚洲性色 | 51午夜福利影视在线观看| 日本vs欧美在线观看视频| 欧美乱色亚洲激情| 欧美日本亚洲视频在线播放| 51午夜福利影视在线观看| 国产在线精品亚洲第一网站| 激情视频va一区二区三区| 日韩欧美三级三区| 免费在线观看黄色视频的| 淫妇啪啪啪对白视频| 亚洲精品中文字幕在线视频| 十八禁网站免费在线| 久99久视频精品免费| 一级毛片高清免费大全| 伊人久久大香线蕉亚洲五| 亚洲黑人精品在线| 国产av一区在线观看免费| 国产午夜福利久久久久久| 99在线人妻在线中文字幕| 无人区码免费观看不卡| 久久 成人 亚洲| av中文乱码字幕在线| 黄色视频,在线免费观看| 欧美黄色淫秽网站| 久久精品亚洲精品国产色婷小说| 午夜视频精品福利| 天堂√8在线中文| 十分钟在线观看高清视频www| 欧美国产精品va在线观看不卡| 人人妻人人澡欧美一区二区 | 精品久久久久久成人av| 黄色成人免费大全| 日本精品一区二区三区蜜桃| 欧美人与性动交α欧美精品济南到| 我的亚洲天堂| 伊人久久大香线蕉亚洲五| 99国产综合亚洲精品| 亚洲免费av在线视频| 亚洲国产精品合色在线| 在线观看免费视频网站a站| 又大又爽又粗| 精品国产乱子伦一区二区三区| 日韩免费av在线播放| 国产一区二区三区在线臀色熟女| 国产亚洲欧美98| 久久久久国产精品人妻aⅴ院| av欧美777| 这个男人来自地球电影免费观看| 久久人妻av系列| 少妇粗大呻吟视频| av有码第一页| 桃色一区二区三区在线观看| 少妇熟女aⅴ在线视频| 午夜a级毛片| 一区二区三区精品91| 日日摸夜夜添夜夜添小说| 日本欧美视频一区| 性色av乱码一区二区三区2| 午夜久久久在线观看| 黄网站色视频无遮挡免费观看| 91精品三级在线观看| 人人妻人人澡人人看| 日韩国内少妇激情av| 久久狼人影院| 一个人观看的视频www高清免费观看 | 精品国产国语对白av| 亚洲少妇的诱惑av| 国产高清有码在线观看视频 | 亚洲一区中文字幕在线| 久久久久久国产a免费观看| 国产成人一区二区三区免费视频网站| 黑人操中国人逼视频| 侵犯人妻中文字幕一二三四区| 成人av一区二区三区在线看| av在线天堂中文字幕| 精品午夜福利视频在线观看一区| 亚洲国产精品合色在线| 在线永久观看黄色视频| 91国产中文字幕| 午夜久久久久精精品| 亚洲精品国产区一区二| 黄色女人牲交| 亚洲欧美一区二区三区黑人| 国内精品久久久久久久电影| 国产熟女xx| 满18在线观看网站| 校园春色视频在线观看| netflix在线观看网站| 欧美av亚洲av综合av国产av| 搡老妇女老女人老熟妇| √禁漫天堂资源中文www| 国产午夜福利久久久久久| 琪琪午夜伦伦电影理论片6080| bbb黄色大片| 成人永久免费在线观看视频| 国产av一区二区精品久久| 久9热在线精品视频| 丝袜美足系列| 国产三级在线视频| 国产精品一区二区三区四区久久 | 999精品在线视频| 成人免费观看视频高清| 久久草成人影院| 亚洲熟女毛片儿| 黄色女人牲交| 在线观看免费午夜福利视频| 99国产精品99久久久久| 美女午夜性视频免费| 久久性视频一级片| 久久香蕉精品热| 男女床上黄色一级片免费看| 国产麻豆69| 97人妻天天添夜夜摸| 国产欧美日韩精品亚洲av| 97超级碰碰碰精品色视频在线观看| 亚洲最大成人中文| 中文字幕人妻丝袜一区二区| 国产成人av教育| 国产乱人伦免费视频| 国产精品九九99| 久久久久国产一级毛片高清牌| 亚洲五月色婷婷综合| 视频区欧美日本亚洲| 中出人妻视频一区二区| 日韩精品中文字幕看吧| 国产精品二区激情视频| 免费在线观看黄色视频的| 精品一区二区三区四区五区乱码| 中文字幕精品免费在线观看视频| 国产欧美日韩一区二区三| 国产国语露脸激情在线看| 欧美 亚洲 国产 日韩一| 色在线成人网| 一本久久中文字幕| 亚洲av成人一区二区三| 丰满的人妻完整版| aaaaa片日本免费| 在线观看免费视频日本深夜| 精品久久久久久久毛片微露脸| 亚洲第一电影网av| 国产亚洲av高清不卡| 国产精品自产拍在线观看55亚洲| 国内久久婷婷六月综合欲色啪| 亚洲 欧美 日韩 在线 免费| videosex国产| 高清在线国产一区| 日韩欧美国产一区二区入口| 中亚洲国语对白在线视频| 看免费av毛片| 亚洲成人精品中文字幕电影| 午夜免费激情av| 男男h啪啪无遮挡| 久久精品国产亚洲av香蕉五月| av福利片在线| 97人妻天天添夜夜摸| 变态另类丝袜制服| 日韩欧美在线二视频| 91字幕亚洲| 国产精品久久久久久人妻精品电影| 高潮久久久久久久久久久不卡| 女人高潮潮喷娇喘18禁视频| 这个男人来自地球电影免费观看| 亚洲午夜理论影院| 午夜免费观看网址| 女人精品久久久久毛片| 精品国产超薄肉色丝袜足j| 国产高清有码在线观看视频 | 国产aⅴ精品一区二区三区波| 日本五十路高清| 免费搜索国产男女视频| 免费一级毛片在线播放高清视频 | 啪啪无遮挡十八禁网站| 日日爽夜夜爽网站| 亚洲片人在线观看| 国产精品 欧美亚洲| 黄色女人牲交| 日本vs欧美在线观看视频| 亚洲三区欧美一区| 成人免费观看视频高清| 国产日韩一区二区三区精品不卡| 欧美日本亚洲视频在线播放| 十八禁人妻一区二区| 欧美 亚洲 国产 日韩一| 国产一区二区激情短视频| 亚洲男人的天堂狠狠| 久久人人97超碰香蕉20202| 制服丝袜大香蕉在线| 精品第一国产精品| 波多野结衣av一区二区av| 99在线视频只有这里精品首页| 天天一区二区日本电影三级 | 69精品国产乱码久久久| 亚洲国产精品合色在线| 国产亚洲欧美在线一区二区| 久久伊人香网站| av天堂在线播放| 在线观看免费日韩欧美大片| 搡老熟女国产l中国老女人| 91麻豆精品激情在线观看国产| 亚洲欧美激情综合另类| 老司机深夜福利视频在线观看| 欧美黑人欧美精品刺激| 亚洲人成电影免费在线| 一本综合久久免费| 色在线成人网| a在线观看视频网站| 搡老熟女国产l中国老女人| 日韩欧美三级三区| 一区在线观看完整版| 91老司机精品| 色哟哟哟哟哟哟| 欧美成人性av电影在线观看| 亚洲色图综合在线观看| 在线观看一区二区三区| 熟女少妇亚洲综合色aaa.| 久久婷婷人人爽人人干人人爱 | 天天躁夜夜躁狠狠躁躁| 国产亚洲欧美98| 无遮挡黄片免费观看| 欧美中文日本在线观看视频| 国产精品香港三级国产av潘金莲| 国产精品 欧美亚洲| 99热只有精品国产| 久久国产精品人妻蜜桃| 男女之事视频高清在线观看| 搞女人的毛片| 亚洲国产精品成人综合色| 国产精品99久久99久久久不卡| 亚洲精华国产精华精| 亚洲一区二区三区色噜噜| 久久这里只有精品19| 1024香蕉在线观看| 国产激情欧美一区二区| 亚洲五月天丁香| 夜夜看夜夜爽夜夜摸| av超薄肉色丝袜交足视频| 大型黄色视频在线免费观看| 操美女的视频在线观看| 88av欧美| 免费一级毛片在线播放高清视频 | 精品久久久精品久久久| 香蕉国产在线看| 美女大奶头视频| 国产成人av激情在线播放| 高清黄色对白视频在线免费看| 午夜精品国产一区二区电影| 亚洲男人的天堂狠狠| 国产精品爽爽va在线观看网站 | 亚洲伊人色综图| 精品第一国产精品| 最近最新中文字幕大全免费视频| 91字幕亚洲| 最新美女视频免费是黄的| 亚洲av第一区精品v没综合| 999精品在线视频| 国产成人啪精品午夜网站| 日韩视频一区二区在线观看| 国产99白浆流出| 欧美日韩亚洲国产一区二区在线观看| 久久久国产精品麻豆| 中文亚洲av片在线观看爽| 在线av久久热| 国产私拍福利视频在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 岛国视频午夜一区免费看| 色婷婷久久久亚洲欧美| 午夜老司机福利片| 亚洲av美国av| 老熟妇乱子伦视频在线观看| 99久久精品国产亚洲精品| 国产99久久九九免费精品| 欧美日韩亚洲综合一区二区三区_| 丝袜在线中文字幕| 非洲黑人性xxxx精品又粗又长| 999久久久国产精品视频| 国产av一区在线观看免费| 国产一区二区三区综合在线观看| 久久人妻av系列| 日韩三级视频一区二区三区| 国语自产精品视频在线第100页| 给我免费播放毛片高清在线观看| 在线观看一区二区三区| 国产成人av激情在线播放| 极品教师在线免费播放| 亚洲欧美精品综合一区二区三区| 91国产中文字幕|