Skip to main content

Advertisement

Log in

Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Secured data transmission and data sharing have always been a challenge on the Internet of things-based networks. Blockchain-enabled peer to peer (P2P) networks are suitable infrastructure for the Internet of Things (IoT) and Beyond 5G (B5G) applications. The advantage is that the distributed nature of architecture and security services provided by this network extends its use in all sort of financial transactions. There are many issues related to IoT based networks; Heterogeneous IoT devices, security, energy issues. This paper implements data security by employing private blockchain in SDN and public blockchain for peer to peer communication and a secured authentication method to validate the blocks in the network. To increase confidentiality and non-repudiation, it implements an additional component; here, the sender signs the particular operation while transferring the data from one user to another user. It is published with a public key and Public-key value-based signature generated with the private key of the transaction. Nodes authenticate this operation based on Public key value-based signature thus generated. The cryptography with hashing process provides better immutability. The results show enhanced security during data transmission and improved throughput, response time, reduction in end-to-end delay and overhead when compared to the existing methods. This work uses Pyethereum tester tool under the Ethereum platform.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Kahina Khacef, Guy Pujolle, (2019), "Secure Peer-to-Peer communication based on Blockchain",Workshops of the International Conference on Advanced Information Networking and Applications WAINA 2019: Web, Artificial Intelligence and Network Applications pp 662-672

  2. Irani Acharjamayum, Ripon Patgiri, Dhruwajita Devi,"Blockchain: A Tale of Peer to Peer Security",IEEE Symposium Series on Computational Intelligence SSCI 2018,978–1–5386-9276-9/18/$31.00c 2018 IEEE

  3. Leila Ismail, Huned Materwala, Symmetry-MDPI, 2019, doi:https://doi.org/10.3390/sym11101198, Article A Review of Blockchain Architecture and Consensus Protocols: Use Cases, Challenges, and Solutions

  4. B. Remote Procedure Call—Wikipedia.Available online: https://en.wikipedia.org/wiki/ Remote procedure call. (accessed- November 2019)

  5. Web API—Wikipedia. Available online: https://en.wikipedia.org/wiki/Web_API (accessed -November 2019)

  6. Merkle RC (1988) “A Digital Signature Based on a Conventional Encryption Function”, Proceedings of the Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO 87, Santa Barbara, CA, USA, 23–27 August 1988. Springer, London, pp 369–378

    Google Scholar 

  7. Swan F, Blockchain M (2015) Blueprint for a new economy. O’Reilly Media, Inc., Newton

    Google Scholar 

  8. K. Gai, Y. Wu, L. Zhu, L. Xu, and Y. Zhang, “Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks”, IEEE Internet of Things Journal, 2019, Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks

  9. Zhang Z, Xiao Y, Ma Z, Xiao M, Ding Z, Lei X, Karagiannidis GK, Fan P (2019) 6G wireless networks: vision, requirements, architecture, and key technologies. IEEE Veh Technol Mag 14(3):28–41

    Article  Google Scholar 

  10. J. Qiu, D. Grace, G. Ding, J. Yao, and Q. Wu, “Blockchain-based secure spectrum trading for unmanned aerial vehicle assisted cellular networks: an operators perspective”, IEEE Internet of Things Journal,2019

  11. R. M. Parizi, Amritraj, and A. Dehghantanha, “Smart contract programming languages on blockchains: An empirical evaluation of usability and security”, in International Conference on Blockchain, pp. 75–91, Springer, 2018

  12. M. Mettler, “Blockchain technology in healthcare: The revolution Starts Here”, in 2016 IEEE 18th International Conference on e-HealthNetworking, Applications and Services (Healthcom), pp. 1–3, IEEE, 2016

  13. M. Pilkington, “11 blockchain technology: principles and applications,” Research handbook on digital transformations, vol. 225, 2016

  14. R. M. Parizi, A. Dehghantanha, K.-K. R. Choo, and A. Singh, “Empirical vulnerability analysis of automated smart contractssecurity testing on blockchains”, in Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, pp. 103–113, IBM Corp., 2018

  15. P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K.- K. R. Choo, “A systematic literature review of blockchain cybersecurity”, Digital Communications and Networks, 2019

  16. R. M. Parizi and A. Dehghantanha, “On the understanding of gamification in blockchain systems”,in 2018 6th International Conferenceon Future Internet of Things and Cloud Workshops (FiCloudW), pp. 214–219, IEEE, 2018

  17. S. R. Basnet and S. Shakya, “Bss: Blockchain security over software defined network”, 2017 International Conference on Computing, Communication and Automation (ICCCA), pp. 720–725, IEEE, 2017

  18. S. Huh, S. Cho, and S. Kim, “Managing IoT devices using blockchain platform,” 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 464–467, IEEE, 2017

  19. A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards an optimized blockchain for IoT”, Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 173–178, ACM, 2017

  20. Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanhaand, Kim-Kwang Raymond Choo, "P4-to-Blockchain: A Secure Blockchain-enabled Packet Parser for Software Defined Networking", Computers & Security • 2019, doi: https://doi.org/10.1016/j.cose.2019.101629

  21. Reza M. Parizi, Sajad Homayoun, Abbas Yazdinejad, Ali Dehghantanha, Kim-Kwang Raymond Choo,"integrating privacy enhancing techniques intoBlockchains using Sidechains", proceedings of the 32nd IEEE candian conference on electrical and computer engineering, 2019

  22. Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Qi Zhang, Kim-Kwang Raymond Choo,"an energy-efficient SDN controller architecture for IoT networks with Blockchain-based security", IEEE Trans Serv Comput, 2020

  23. SanazKavianpour BS, Azam S, Zamani M, Samy GN, De Boer F (2019, Article ID 5747136, 14 pages) A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices. J Comput Netw Commun. https://doi.org/10.1155/2019/574713

  24. J. Wang, L. Wu, K.-K. R. Choo, and D. He, “Blockchain based anonymous authentication with key management for smart grid edge computing infrastructure”, IEEE Transactions on Industrial Informatics, 2019

  25. L. Xiong and L. et al., “A blockchain-based privacy-awareness authentication scheme with efficient revocation for multi-server architectures”, IEEE Access, vol. 7, pp. 125 840–125 853, 2019

  26. J. Wan, J. Li, M. Imran, D. Li et al., IEEE Transactions on Industrial Informatics, 2019, A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory

  27. Z. Lu, Q. Wang, G. Qu, H. Zhang, and Z. Liu, “A blockchain-based privacy-preserving authentication scheme for vanets,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019

  28. Li L, Liu J, Cheng L, Qiu S, Wang W, Zhang X, Zhang Z (2018) Creditcoin: a privacy-preserving blockchain-based incentive announcementnetwork for communications of smart vehicles. IEEE Trans Intell Transp Syst 19(7):2204–2220

    Article  Google Scholar 

  29. Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Futur Gener Comput Syst 97:512–529

    Article  Google Scholar 

  30. M. Ma, G. Shi, and F. Li, “Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario”, IEEE Access, vol. 7, pp. 34 045–34 059, 2019

  31. S. Ding, J. Cao, C. Li, K. Fan, and H. Li, “A novel attribute-based access control scheme using blockchain for IoT,” IEEE Access, vol. 7,pp. 38 431–38 441, 2019

  32. Z. Liu, L. Gao, Y. Liu, X. Guan, K. Ma, and Y. Wang, IEEE Transactions on Industrial Informatics, 2019, Efficient QoS Support for Robust Resource Allocation in Blockchain-based Femtocell Networks

  33. Yang M, Margheri A, Hu R, Sassone V (2018) Differentially private data sharing in a cloud federation with blockchain. IEEE Cloud Computing 5(6):69–79

    Article  Google Scholar 

  34. Y. Liu, R. Yu, X. Li, H. Ji, and V. C. Leung, IEEE Transactions on VehicularTechnology, 2019, Decentralized Resource Allocation for Video Transcoding and Delivery in Blockchain-Based System With Mobile Edge Computing

  35. M. B. Weiss, K. Werbach, D. C. Sicker, and C. Caicedo, IEEE Transactions on Cognitive Communications and Networking, 2019, On the Application of Blockchains to Spectrum Management

  36. Kotobi K, Bilen SG (2018) Secure blockchains for dynamic spectrum access: a decentralized database in moving cognitive radio networksenhances security and user access. IEEE Veh Technol Mag 13(1):32–39

    Article  Google Scholar 

  37. W. Liang, M. Tang, J. Long, X. Peng, J. Xu, and K.-C. Li, “A securefabric blockchain-based data transmission technique for industrial internet-of-things”,IEEE Transactions on Industrial Informatics, 2019

  38. C. H. Liu, Q. Lin, and S. Wen, “Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning”, IEEETransactions on Industrial Informatics, 2018

  39. Li D, Du R, Fu Y, Au MH (2019) Meta-key: a secure data-sharing protocol under blockchain-based decentralized storage architecture. IEEE Networking Lett 1(1):30–33

    Article  Google Scholar 

  40. Fan K, Ren Y, Wang Y, Li H, Yang Y (2017) Blockchain-basedefficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun 12(5):527–532

    Article  Google Scholar 

  41. Y. Zhang, C. Xu, X. Lin, and X. S. Shen, IEEE Transactions on Cloud Computing, 2019, Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors

  42. Aakanksha Tewari and B.B. Gupta, "A novel ECC-based lightweight authentication protocol for internet of things devices", Int. J. High Performance Computing and Networking, Vol. 15, Nos. 1/2, 2019

  43. Haoxuan Li, Hui Huang, Shichong Tan, Ning Zhang and Xiaotong Fu,"A new revocable reputation evaluation system based on blockchain", Int. J. High Performance Computing and Networking, Vol. 14, No. 3, 2019

  44. Christos Stergiou, Kostas E.Psannis, Brij B. Gupta and Yutaka Ishibashi, "Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT",Sustainable Computing: Informatics and Systems,Volume 19, September 2018, Pages 174–184

  45. Aakanksha Tewari BB (2020) Gupta, "security, privacy and trust of different layers in internet-of-things (IoTs) framework ". Future Generation Comput Syst 108:909–920

    Article  Google Scholar 

  46. Berenjian SSaeed Hajizadeh and Reza Ebrahimi Atani, "an incentive security model to provide fairness for peer-to-peer networks",2019 IEEE conference on application. Inform Netw Secur (AINS). https://doi.org/10.1109/AINS47559.2019.8968699

  47. Naghizadeh A, Berenjian S, Meamari E, Atani RE (2016) Structural-based tunneling: preserving mutual anonymity for circular P2P networks. Int J Commun Syst 29:602–619

    Article  Google Scholar 

  48. Alireza Naghizadeh; Samaneh Berenjian ; Behrooz Razeghi; Saghi Shahanggar ; Nima Razagh Pour, "Preserving receiver's anonymity for circular structured P2P networks”, 2015 12th Annual IEEE Consumer Commun Netw Conference (CCNC), https://doi.org/10.1109/CCNC.2015.7157949

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Perumal Sankar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on P2P Computing for Beyond 5G Network and Internet-of-Everything

Guest Editors: Prakasam P, Ajayan John, Shohel Sayeed

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sankar, S.P., Subash, T.D., Vishwanath, N. et al. Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things. Peer-to-Peer Netw. Appl. 14, 392–402 (2021). https://doi.org/10.1007/s12083-020-00971-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00971-w

Keywords

Navigation