Blockchain and AI-assisted Onion Routing Protocol for Strengthening Anonymity in Beyond 5G IoMVs Networks

被引:0
作者
Gupta, Rajesh [1 ]
Jadav, Nilesh Kumar [1 ]
Tanwar, Sudeep [1 ]
Nayyar, Anand [2 ]
机构
[1] Nirma Univ, Dept CSE, Inst Technol, Ahmadabad, Gujarat, India
[2] Duy Tan Univ, Sch Comp Sci, Fac Informat Technol, Da Nang, Vietnam
来源
PROCEEDINGS OF 2023 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION TECHNOLOGY, ICIIT 2023 | 2023年
关键词
6G; Anonymity; Artificial Intelligence; Blockchain; Onion Routing;
D O I
10.1145/3591569.3591582
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper overcomes the security and privacy issues of the Internet of military vehicles (IoMVs), wherein the attackers intercept and manipulate the IoMV communication to disrupt military operations. Moreover, IoMV communication uses the public Internet to route their sensitive data, which is open to several network-related attacks, such as data injection, session hijacking, privilege escalation, etc. To overcome the aforesaid security and privacy concerns, we proposed a blockchain and artificial intelligence (AI)-assisted onion routing framework to strengthen the security and anonymity of IoMVs participating in military operations. AI algorithms are amended to classify the malicious and non-malicious IoMVs so that only non-malicious IoMVs can participate in the data exchange via the onion routing network. In addition, each IoMV is uniquely identified by two identifiers, i.e., tag and verifying token, which is stored in the block of a blockchain. These identifiers authenticate and validate the participating IoMVs. Based on that, non-malicious IoMVs can participate in the onion routing network to securely transmit sensitive data. Further, each entity of the proposed frame-work utilized the indispensable characteristics of a 6G network to minimize the data loss and validated using the packet drop ratio parameter. Lastly, the proposed framework is evaluated using different evaluation metrics, such as statistical measures and blockchain processing time.
引用
收藏
页码:78 / 85
页数:8
相关论文
共 17 条
  • [1] Al-Hawawreh Muna, 2021, X-IIoTID: A Connectivityand Device-agnostic Intrusion Dataset for Industrial Internet of Things, DOI [10.21227/mpb6-py55, DOI 10.21227/MPB6-PY55]
  • [2] Amutha S, 2020, INT CONF ADVAN COMPU, P1086, DOI [10.1109/icaccs48705.2020.9074443, 10.1109/ICACCS48705.2020.9074443]
  • [3] Berner Noah, 2022, Breaking security protocols with a quantum computer
  • [4] Bruvoll S., 2020, IEEE CONF COMM NETW, P1, DOI [10.1109/CNS48642.2020.9162227, DOI 10.1109/cns48642.2020.9162227]
  • [5] WIP: An Onion-Based Routing Protocol Strengthening Anonymity
    Buccafurri, Francesco
    De Angelis, Vincenzo
    Idone, Maria Francesca
    Labrini, Cecilia
    [J]. 2021 IEEE 22ND INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2021), 2021, : 231 - 235
  • [6] B-IoMV: Blockchain-based onion routing protocol for D2D communication in an IoMV environment beyond 5G
    Gupta, Rajesh
    Tanwar, Sudeep
    Kumar, Neeraj
    [J]. VEHICULAR COMMUNICATIONS, 2022, 33
  • [7] When Blockchain Meets Edge Intelligence: Trusted and Security Solutions for Consumers
    Gupta, Rajesh
    Reebadiya, Dakshita
    Tanwar, Sudeep
    Kumar, Neeraj
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2021, 35 (05): : 272 - 278
  • [8] Highly Anonymous Mobility-Tolerant Location-Based Onion Routing for VANETs
    Haghighi, Mohammad Sayad
    Aziminejad, Zahra
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 2582 - 2590
  • [9] Network Security Implementation by Onion Routing
    Kaviya, K.
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 339 - 342
  • [10] Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie Hellman Key Exchange for LTE Military Grade Communication
    Moussa, Karim H.
    El-Sakka, Ahmed H.
    Shaaban, Shawky
    Kheirallah, Hassan Nadir
    [J]. IEEE ACCESS, 2022, 10 : 80352 - 80364