Affiliation:
1. Ph.D. Scholar ECE Department, Oriental University, Indore
2. Associate Professor and Head of Department, Electrical and Electronics Engineering, Oriental University, Indore
Abstract
Trust enabled wireless networks use temporal behaviour information of nodes in order to classify them into different trust categories. This information is utilized by the router for high performance communication that is optimized in terms of end-to-end delay, energy consumption, throughput, packet delivery ratio, and other quality of service (QoS) parameters. Establishing security in trust enabled wireless networks is a difficult task, because high trust nodes might be compromised by external or internal attacks, thereby disrupting normal communication. In order to perform this task, blockchain based security models are deployed. These models provide high transparency, comprehensive traceability, distributed processing, and data immutability, which makes them highly deployable for trust enabled networks. Blockchain models enforce compulsive verification of data before communication, which makes them resilient to DDoS, MITM, denial of service, and other data-based attacks. In order to enforce these checks, each of the block is hashed, and the hash values are compared with every existing block in the chain. These checks include hash uniqueness, and hash pattern validations; the later of which is decided by the network designer(s). As the length of blockchain increases, computational complexity of adding a new block (a.k.a. blockchain mining) increases exponentially, which adds to the end-to-end delay, and energy consumption of wireless nodes, which is a drawback of these models. To avoid this, sidechains & blockchain sharding models are developed. These models work by dividing the existing blockchain into multiple parts (based on a certain pre-set criteria), and then use the parts for high speed and low power mining. But again, due to increase in number of sidechains, the computational complexity of managing these chains, and locating data blocks within them increases exponentially. Moreover, in any practical wireless network, there is a need to communicate modifiable data, which is not supported by current blockchain implementations. In order to resolve these issues, this text proposes a transformable blockchain sharding model, which is managed via a light weight meta heuristic method for high-speed data access. The proposed model aims at reducing computational complexity of sidechain maintenance with the help of directed acyclic graphs (DAGs) for storing of hash ranges. The model also incorporates a transformable blockchain solution, wherein the block structure is designed to incorporate selectively mutable as well as non-mutable information. Both the mutable and non-mutable information is encrypted using high performance elliptic curve cryptosystem, which makes it highly secure against network attacks. The proposed model showcases 15% improvement in network lifetime, 8% reduction in end-to-end delay, 22% reduction in computational complexity, and 18% improvement in network throughput when compared with various blockchain and sidechain based wireless networks, thereby assisting in development of a high QoS and highly secure wireless network.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference51 articles.
1. 5G: Vision and Requirements for Mobile Communication System towardsYear 2020;Guangyi Liu;Chinese Journal of Engineering,2016
2. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack;Emanuel Ferreira Jesus;Security and Communication Networks,2018
3. Utilization of blockchain for mitigating the distributed denial of service attacks;Singh;Security and Privacy,2020
4. A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community, in;Li;IEEE Open Journal of the Communications Society,2020
5. RAFT Based Wireless Blockchain Networks in the Presence of Malicious Jamming, in;Xu;IEEE Wireless Communications Letters,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献