Secure Modern Wireless Communication Network Based on Blockchain Technology
Sixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple heterogeneity applications and facilities may be supported by modern wireless communication networks (MWCNs) with improved effectivenes...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-02-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/5/1095 |
_version_ | 1797615537902059520 |
---|---|
author | Radha Raman Chandan Awatef Balobaid Naga Lakshmi Sowjanya Cherukupalli Gururaj H L Francesco Flammini Rajesh Natarajan |
author_facet | Radha Raman Chandan Awatef Balobaid Naga Lakshmi Sowjanya Cherukupalli Gururaj H L Francesco Flammini Rajesh Natarajan |
author_sort | Radha Raman Chandan |
collection | DOAJ |
description | Sixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple heterogeneity applications and facilities may be supported by modern wireless communication networks (MWCNs) with improved effectiveness and protection. Nevertheless, a variety of trust-related problems that are commonly disregarded in network architectures prevent us from achieving this objective. In the current world, MWCN transmits a lot of sensitive information. It is essential to protect MWCN users from harmful attacks and offer them a secure transmission to meet their requirements. A malicious node causes a major attack on reliable data during transmission. Blockchain offers a potential answer for confidentiality and safety as an innovative transformative tool that has emerged in the last few years. Blockchain has been extensively investigated in several domains, including mobile networks and the Internet of Things, as a feasible option for system protection. Therefore, a blockchain-based modal, Transaction Verification Denied conflict with spurious node (TVDCSN) methodology, was presented in this study for wireless communication technologies to detect malicious nodes and prevent attacks. In the suggested mode, malicious nodes will be found and removed from the MWCN and intrusion will be prevented before the sensitive information is transferred to the precise recipient. Detection accuracy, attack prevention, security, network overhead, and computation time are the performance metrics used for evaluation. Various performance measures are used to assess the method’s efficacy, and it is compared with more traditional methods. |
first_indexed | 2024-03-11T07:27:57Z |
format | Article |
id | doaj.art-c5812f270ada4366ab6a3900f4b0847d |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-11T07:27:57Z |
publishDate | 2023-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-c5812f270ada4366ab6a3900f4b0847d2023-11-17T07:31:36ZengMDPI AGElectronics2079-92922023-02-01125109510.3390/electronics12051095Secure Modern Wireless Communication Network Based on Blockchain TechnologyRadha Raman Chandan0Awatef Balobaid1Naga Lakshmi Sowjanya Cherukupalli2Gururaj H L3Francesco Flammini4Rajesh Natarajan5Department of Computer Science, School of Management Sciences (SMS), Varanasi 221001, IndiaDepartment of Computer Science, Jazan University, Jazan 45142, Saudi ArabiaCSE Department, Koneru Lakshmaiah Education Foundation, Green Fields, Vaddeswaram, Andhra Pradesh, Guntur 522302, IndiaDepartment of Information Technology, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal 576104, IndiaIDSIA USI-SUPSI, University of Applied Sciences and Arts of Southern Switzerland, 6928 Manno, SwitzerlandInformation Technology Department, University of Technology and Applied Sciences-Shinas, Shinas 324, OmanSixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple heterogeneity applications and facilities may be supported by modern wireless communication networks (MWCNs) with improved effectiveness and protection. Nevertheless, a variety of trust-related problems that are commonly disregarded in network architectures prevent us from achieving this objective. In the current world, MWCN transmits a lot of sensitive information. It is essential to protect MWCN users from harmful attacks and offer them a secure transmission to meet their requirements. A malicious node causes a major attack on reliable data during transmission. Blockchain offers a potential answer for confidentiality and safety as an innovative transformative tool that has emerged in the last few years. Blockchain has been extensively investigated in several domains, including mobile networks and the Internet of Things, as a feasible option for system protection. Therefore, a blockchain-based modal, Transaction Verification Denied conflict with spurious node (TVDCSN) methodology, was presented in this study for wireless communication technologies to detect malicious nodes and prevent attacks. In the suggested mode, malicious nodes will be found and removed from the MWCN and intrusion will be prevented before the sensitive information is transferred to the precise recipient. Detection accuracy, attack prevention, security, network overhead, and computation time are the performance metrics used for evaluation. Various performance measures are used to assess the method’s efficacy, and it is compared with more traditional methods.https://www.mdpi.com/2079-9292/12/5/1095blockchainwireless communication networkmalicious nodesecurity protocolintrusion detection |
spellingShingle | Radha Raman Chandan Awatef Balobaid Naga Lakshmi Sowjanya Cherukupalli Gururaj H L Francesco Flammini Rajesh Natarajan Secure Modern Wireless Communication Network Based on Blockchain Technology Electronics blockchain wireless communication network malicious node security protocol intrusion detection |
title | Secure Modern Wireless Communication Network Based on Blockchain Technology |
title_full | Secure Modern Wireless Communication Network Based on Blockchain Technology |
title_fullStr | Secure Modern Wireless Communication Network Based on Blockchain Technology |
title_full_unstemmed | Secure Modern Wireless Communication Network Based on Blockchain Technology |
title_short | Secure Modern Wireless Communication Network Based on Blockchain Technology |
title_sort | secure modern wireless communication network based on blockchain technology |
topic | blockchain wireless communication network malicious node security protocol intrusion detection |
url | https://www.mdpi.com/2079-9292/12/5/1095 |
work_keys_str_mv | AT radharamanchandan securemodernwirelesscommunicationnetworkbasedonblockchaintechnology AT awatefbalobaid securemodernwirelesscommunicationnetworkbasedonblockchaintechnology AT nagalakshmisowjanyacherukupalli securemodernwirelesscommunicationnetworkbasedonblockchaintechnology AT gururajhl securemodernwirelesscommunicationnetworkbasedonblockchaintechnology AT francescoflammini securemodernwirelesscommunicationnetworkbasedonblockchaintechnology AT rajeshnatarajan securemodernwirelesscommunicationnetworkbasedonblockchaintechnology |