Secure Modern Wireless Communication Network Based on Blockchain Technology
【Author】 Chandan, Radha Raman; Balobaid, Awatef; Cherukupalli, Naga Lakshmi Sowjanya; Gururaj, H. L.; Flammini, Francesco; Natarajan, Rajesh
【Source】ELECTRONICS
【影响因子】2.690
【Abstract】Sixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple heterogeneity applications and facilities may be supported by modern wireless communication networks (MWCNs) with improved effectiveness and protection. Nevertheless, a variety of trust-related problems that are commonly disregarded in network architectures prevent us from achieving this objective. In the current world, MWCN transmits a lot of sensitive information. It is essential to protect MWCN users from harmful attacks and offer them a secure transmission to meet their requirements. A malicious node causes a major attack on reliable data during transmission. Blockchain offers a potential answer for confidentiality and safety as an innovative transformative tool that has emerged in the last few years. Blockchain has been extensively investigated in several domains, including mobile networks and the Internet of Things, as a feasible option for system protection. Therefore, a blockchain-based modal, Transaction Verification Denied conflict with spurious node (TVDCSN) methodology, was presented in this study for wireless communication technologies to detect malicious nodes and prevent attacks. In the suggested mode, malicious nodes will be found and removed from the MWCN and intrusion will be prevented before the sensitive information is transferred to the precise recipient. Detection accuracy, attack prevention, security, network overhead, and computation time are the performance metrics used for evaluation. Various performance measures are used to assess the method's efficacy, and it is compared with more traditional methods.
【Keywords】blockchain; wireless communication network; malicious node; security protocol; intrusion detection
【发表时间】2023 MAR
【收录时间】2023-04-01
【文献类型】实验仿真
【主题类别】
区块链应用-实体经济-交通领域
评论