Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks

被引:8
作者
Vairagade, Rupali Sachin [1 ]
Brahmananda, S. H. [1 ]
机构
[1] GITAM Deemed Univ, Dept Comp Sci & Engn, GITAM Sch Technol, Bengaluru, India
关键词
MALWARE DETECTION; INDUSTRIAL IOT; SECURE; SYSTEM; MODEL;
D O I
10.1002/ett.4433
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Problem The Internet of Things (IoT) makes developers for integrating various collection of device, saving, and processing a huge amount of data, allowing new services for improving several personal and professional activities. But, the privacy problems occur with a large amount of data produced and therefore the solutions on the basis of blockchain with sidechain technology have been developed to overcome these problems. Aim Blockchain powered IoT networks have high security levels, and are resilient to most network attacks. In order to deploy blockchains, a large set of hashing, encryption, and linking algorithms are implemented in the network. One of the recent developments is the sidechains and these sidechains reduce computational complexity during block creation, and thereby reduce the effect of high delay and high-power consumption in the IoT network. But maintaining these sidechains requires an additional computational component, which adds to the computational complexity of the underlying system. To reduce the complexity of this maintenance while keeping the inherent advantages of side chaining networks, this article proposes a sidechain creation, updation, merging, and scanning processes. Methods In this article, the sidechain creation is done by modified two-way peg protocol and updated by hybrid delegated practical byzantine fault tolerance-delegated proof of stake (DPBFT-DPOS), merging via continuous network information analysis and scanning via graph-based searching mechanism to improve the Quality of Service (QoS) network and security. Results The proposed methodology achieves an accuracy and F1-score of about 98.6% and 99.5%, reduces end-to-end communication delay by 10% while increasing the energy efficiency by 15%, and improving the throughput by 15% when compared to other existing methods. Conclusion The IoT provides the possibility of creating real time data and the combination of the IoT with blockchain moves beyond authorization and financial recording. Then the utilization of sidechain provide better communication among devices and better sophistication of the data processing.
引用
收藏
页数:23
相关论文
共 44 条
  • [11] Blockchain in Energy Efficiency: Potential Applications and Benefits
    Khatoon, Asma
    Verma, Piyush
    Southernwood, Jo
    Massey, Beth
    Corcoran, Peter
    [J]. ENERGIES, 2019, 12 (17)
  • [12] Krcmar, 2019, ELECTRON MARK, V30, P1
  • [13] A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features
    Kumar, Rajesh
    Zhang, Xiaosong
    Wang, Wenyong
    Khan, Riaz Ullah
    Kumar, Jay
    Sharif, Abubaker
    [J]. IEEE ACCESS, 2019, 7 : 64411 - 64430
  • [14] Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network
    Lakhan, Abdullah
    Memon, Muhammad Suleman
    Mastoi, Qurat-ul-ain
    Elhoseny, Mohamed
    Mohammed, Mazin Abed
    Qabulio, Mumtaz
    Abdel-Basset, Mohamed
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 2061 - 2083
  • [15] BIDaaS: Blockchain Based ID As a Service
    Lee, Jong-Hyouk
    [J]. IEEE ACCESS, 2018, 6 : 2274 - 2278
  • [16] EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices
    Lei, Tao
    Qin, Zhan
    Wang, Zhibo
    Li, Qi
    Ye, Dengpan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 6668 - 6680
  • [17] Li H., 2021, MOB INF SYST, P2021
  • [18] BDDT: use blockchain to facilitate IoT data transactions
    Li, Hui
    Pei, Lishuang
    Liao, Dan
    Wang, Xiong
    Xu, Du
    Sun, Jian
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01): : 459 - 473
  • [19] A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community
    Li, Min
    Tang, Helen
    Hussein, Ahmed Refaey
    Wang, Xianbin
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2020, 1 (01): : 282 - 292
  • [20] Supporting IoT With Rate-Splitting Multiple Access in Satellite and Aerial-Integrated Networks
    Lin, Zhi
    Lin, Min
    de Cola, Tomaso
    Wang, Jun-Bo
    Zhu, Wei-Ping
    Cheng, Julian
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14) : 11123 - 11134