Enhancing security & QoS of trust-enabled wireless networks using machine learning powered transformable blockchain sharding

Author:

Bhatnagar Manisha1,Thankachan Dolly2

Affiliation:

1. Ph.D. Scholar ECE Department, Oriental University, Indore

2. Associate Professor and Head of Department, Electrical and Electronics Engineering, Oriental University, Indore

Abstract

Trust enabled wireless networks use temporal behaviour information of nodes in order to classify them into different trust categories. This information is utilized by the router for high performance communication that is optimized in terms of end-to-end delay, energy consumption, throughput, packet delivery ratio, and other quality of service (QoS) parameters. Establishing security in trust enabled wireless networks is a difficult task, because high trust nodes might be compromised by external or internal attacks, thereby disrupting normal communication. In order to perform this task, blockchain based security models are deployed. These models provide high transparency, comprehensive traceability, distributed processing, and data immutability, which makes them highly deployable for trust enabled networks. Blockchain models enforce compulsive verification of data before communication, which makes them resilient to DDoS, MITM, denial of service, and other data-based attacks. In order to enforce these checks, each of the block is hashed, and the hash values are compared with every existing block in the chain. These checks include hash uniqueness, and hash pattern validations; the later of which is decided by the network designer(s). As the length of blockchain increases, computational complexity of adding a new block (a.k.a. blockchain mining) increases exponentially, which adds to the end-to-end delay, and energy consumption of wireless nodes, which is a drawback of these models. To avoid this, sidechains & blockchain sharding models are developed. These models work by dividing the existing blockchain into multiple parts (based on a certain pre-set criteria), and then use the parts for high speed and low power mining. But again, due to increase in number of sidechains, the computational complexity of managing these chains, and locating data blocks within them increases exponentially. Moreover, in any practical wireless network, there is a need to communicate modifiable data, which is not supported by current blockchain implementations. In order to resolve these issues, this text proposes a transformable blockchain sharding model, which is managed via a light weight meta heuristic method for high-speed data access. The proposed model aims at reducing computational complexity of sidechain maintenance with the help of directed acyclic graphs (DAGs) for storing of hash ranges. The model also incorporates a transformable blockchain solution, wherein the block structure is designed to incorporate selectively mutable as well as non-mutable information. Both the mutable and non-mutable information is encrypted using high performance elliptic curve cryptosystem, which makes it highly secure against network attacks. The proposed model showcases 15% improvement in network lifetime, 8% reduction in end-to-end delay, 22% reduction in computational complexity, and 18% improvement in network throughput when compared with various blockchain and sidechain based wireless networks, thereby assisting in development of a high QoS and highly secure wireless network.

Publisher

IOS Press

Subject

Artificial Intelligence,General Engineering,Statistics and Probability

Reference51 articles.

1. 5G: Vision and Requirements for Mobile Communication System towardsYear 2020;Guangyi Liu;Chinese Journal of Engineering,2016

2. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack;Emanuel Ferreira Jesus;Security and Communication Networks,2018

3. Utilization of blockchain for mitigating the distributed denial of service attacks;Singh;Security and Privacy,2020

4. A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community, in;Li;IEEE Open Journal of the Communications Society,2020

5. RAFT Based Wireless Blockchain Networks in the Presence of Malicious Jamming, in;Xu;IEEE Wireless Communications Letters,2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3