Enhancing security & QoS of trust-enabled wireless networks using machine learning powered transformable blockchain sharding

被引:0
|
作者
Bhatnagar, Manisha [1 ]
Thankachan, Dolly [2 ]
机构
[1] Oriental Univ, ECE Dept, Indore, India
[2] Oriental Univ, Elect & Elect Engn, Indore, India
关键词
Wireless; trust-enabled; sharding; blockchain; meta heuristic; DAG; RESOURCE-ALLOCATION; SCHEME; FRAMEWORK; SYSTEM; AUTHENTICATION; ALGORITHM; MECHANISM; DELIVERY; DESIGN; NODE;
D O I
10.3233/JIFS-213482
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trust enabled wireless networks use temporal behaviour information of nodes in order to classify them into different trust categories. This information is utilized by the router for high performance communication that is optimized in terms of end-to-end delay, energy consumption, throughput, packet delivery ratio, and other quality of service (QoS) parameters. Establishing security in trust enabled wireless networks is a difficult task, because high trust nodes might be compromised by external or internal attacks, thereby disrupting normal communication. In order to perform this task, blockchain based security models are deployed. These models provide high transparency, comprehensive traceability, distributed processing, and data immutability, which makes them highly deployable for trust enabled networks. Blockchain models enforce compulsive verification of data before communication, which makes them resilient to DDoS, MITM, denial of service, and other data-based attacks. In order to enforce these checks, each of the block is hashed, and the hash values are compared with every existing block in the chain. These checks include hash uniqueness, and hash pattern validations; the later of which is decided by the network designer(s). As the length of blockchain increases, computational complexity of adding a new block (a.k.a. blockchain mining) increases exponentially, which adds to the end-to-end delay, and energy consumption of wireless nodes, which is a drawback of these models. To avoid this, sidechains & blockchain sharding models are developed. These models work by dividing the existing blockchain into multiple parts (based on a certain pre-set criteria), and then use the parts for high speed and low power mining. But again, due to increase in number of sidechains, the computational complexity of managing these chains, and locating data blocks within them increases exponentially. Moreover, in any practical wireless network, there is a need to communicate modifiable data, which is not supported by current blockchain implementations. In order to resolve these issues, this text proposes a transformable blockchain sharding model, which is managed via a light weight meta heuristic method for high-speed data access. The proposed model aims at reducing computational complexity of sidechain maintenance with the help of directed acyclic graphs (DAGs) for storing of hash ranges. The model also incorporates a transformable blockchain solution, wherein the block structure is designed to incorporate selectively mutable as well as non-mutable information. Both the mutable and non-mutable information is encrypted using high performance elliptic curve cryptosystem, which makes it highly secure against network attacks. The proposed model showcases 15% improvement in network lifetime, 8% reduction in end-to-end delay, 22% reduction in computational complexity, and 18% improvement in network throughput when compared with various blockchain and sidechain based wireless networks, thereby assisting in development of a high QoS and highly secure wireless network.
引用
收藏
页码:41 / 58
页数:18
相关论文
共 13 条
  • [1] Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
    Ismail, Shereen
    Dawoud, Diana W. W.
    Reza, Hassan
    FUTURE INTERNET, 2023, 15 (06):
  • [2] Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning
    Anjum, Mohd
    Kraiem, Naoufel
    Min, Hong
    Dutta, Ashit Kumar
    Daradkeh, Yousef Ibrahim
    Shahab, Sana
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [3] Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks
    Vairagade, Rupali Sachin
    Brahmananda, S. H.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [4] Blockchain-Enabled IDPS and Federated Learning for Enhancing CPS Security against Advanced Persistent Threats in Zero Trust Architectures
    Arif, Tuba
    Jo, Byunghyun
    Kang, Jungho
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2025, 15
  • [5] Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks
    Chinnaswamy, Santhanakrishnan
    Annapurani, K.
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
  • [6] Task Offloading for Wireless VR-Enabled Medical Treatment With Blockchain Security Using Collective Reinforcement Learning
    Lin, Peng
    Song, Qingyang
    Yu, F. Richard
    Wang, Dan
    Guo, Lei
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21): : 15749 - 15761
  • [7] RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning
    Chatterjee, Baibhab
    Das, Debayan
    Maity, Shovan
    Sen, Shreyas
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) : 388 - 398
  • [8] Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques
    Chinnasamy, Ponnusamy
    Babu, G. Charles
    Ayyasamy, Ramesh Kumar
    Amutha, S.
    Sinha, Keshav
    Balaram, Allam
    SENSORS, 2024, 24 (18)
  • [9] Energy Maximization for Wireless Powered Communication Enabled IoT Devices With NOMA Underlaying Solar Powered UAV Using Federated Reinforcement Learning for 6G Networks
    Jabbari, Abdoh
    Khan, Haneef
    Duraibi, Salahaldeen
    Budhiraja, Ishan
    Gupta, Suneet
    Omar, Marwan
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 3926 - 3939
  • [10] Enhancing Security in 5G Edge Networks: Predicting Real-Time Zero Trust Attacks Using Machine Learning in SDN Environments
    Ashfaq, Fiza
    Wasim, Muhammad
    Shah, Mumtaz Ali
    Ahad, Abdul
    Pires, Ivan Miguel
    SENSORS, 2025, 25 (06)