Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks

被引:21
作者
Babu, Erukala Suresh [1 ]
Barthwal, Amogh [1 ]
Kaluri, Rajesh [2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Warangal, India
[2] VIT, Sch Informat Technol & Engn, Vellore, India
关键词
5G; Blockchain; IoT; Edge computing; Authentication; Security;
D O I
10.1016/j.comcom.2022.12.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 5th generation 5G technology, also known as the 2020 telecommunications system, represents the next exciting phase of the evolution of telecommunications, with the recent successful distribution on nearly every continent. 5G is believed to bring multiple advancements such as greater transmission speeds, ultra-low latency, higher network capacity, etc. These advancements will directly support the industry-5.0 and Internet of Things (IoT) in the coming future. Today, IoT is one of the fastest-growing technologies because of its ability to deliver multiple applications across various devices. The emergence of 5G networks will be a major force for IoT development. Subsequently, Edge computing as an extension of cloud computing has emerged as a promising technology to empower 5G and IoT services due to its close vicinity to IoT Devices. However, specific challenging issues plague the integration of 5G, IoT, and Edge Computing, among which security is one of the biggest concerns. Recently, blockchain has been provided as a foundational and decentralized distributed ledger technology that can be used for solving the challenges of IoT, 5G, and Edge Computing integration. This paper proposes a trusted blockchain system for edge-based 5G networks that eliminates the limitations of integrating the Edge Computing, IoT, and 5G networks. The proposed blockchain system can efficiently identify the edge devices, authenticate the devices, and assign the addresses to the edge devices on a demand basis. Further, the proposed work also provides the secure communication among the edge devices that can protect from DDOS and Side-channel attacks.
引用
收藏
页码:10 / 29
页数:20
相关论文
共 36 条
  • [21] Gopi A.P., 2016, INT J ELECT COMPUT E, V6, P1857, DOI [10.11591/ijece.v6i4.9941, DOI 10.11591/IJECE.V6I4.9941]
  • [22] Hakiri Akram, 2021, SDN-NFV Sec'21: Proceedings of the 2021 International Workshop on Software Defined Networks & Network Function Virtualization Security, P11, DOI 10.1145/3445968.3452090
  • [23] Helen S, 2021, Blockchain based smart healthcare systems in 5G networks for preventing data forgery
  • [24] Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing
    Hewa, Tharaka
    Braeken, An
    Liyanage, Madhusanka
    Ylianttila, Mika
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (10) : 7174 - 7185
  • [25] Blockchain-based Automated Certificate Revocation for 5G IoT
    Hewa, Tharaka
    Braeken, An
    Ylianttila, Mika
    Liyana, Madhusanka
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [26] Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
    Jangirala, Srinivas
    Das, Ashok Kumar
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7081 - 7093
  • [27] Jovovic I., 2018, 5G BLOCKCHAIN IPFS G, DOI [10.4108/eai.6-11-2018.2279695, DOI 10.4108/EAI.6-11-2018.2279695]
  • [28] Kumar S.A., 2015, INT J ELECT COMPUT E, V5
  • [29] Blockchain-Based Secure Storage Management with Edge Computing for IoT
    Nyamtiga, Baraka William
    Sicato, Jose Costa Sapalo
    Rathore, Shailendra
    Sung, Yunsick
    Park, Jong Hyuk
    [J]. ELECTRONICS, 2019, 8 (08)
  • [30] An enhanced approach for three factor remote user authentication in multi - server environment
    Patel, Chintan
    Joshi, Dhara
    Doshi, Nishant
    Veeramuthu, A.
    Jhaveri, Rutvij
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (06) : 8609 - 8620