Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques

被引:2
|
作者
Chinnasamy, Ponnusamy [1 ]
Babu, G. Charles [2 ]
Ayyasamy, Ramesh Kumar [3 ]
Amutha, S. [4 ]
Sinha, Keshav [5 ]
Balaram, Allam [6 ]
机构
[1] Kalasalingam Acad Res & Educ, Sch Comp, Dept Comp Sci & Engn, Srivilliputtur 626126, Tamil Nadu, India
[2] Gokaraju Rangaraju Inst Engn & Technol, Dept Comp Sci & Engn, Hyderabad 500090, Telangana, India
[3] Univ Tunku Abdul Rahman UTAR, Fac Informat & Commun Technol, Kampar 31900, Malaysia
[4] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Sch Comp, Dept Comp Sci & Engn, Chennai 600062, Tamil Nadu, India
[5] UPES, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[6] MLR Inst Technol, Dept Comp Sci & Engn, Hyderabad 500043, Telangana, India
关键词
blockchain; 6G networks; wireless network; security management; machine learning; SENSOR NETWORKS;
D O I
10.3390/s24186143
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks to satisfy. The limitations of 5G networks have been apparent with the deployment of more and more 5G networks, which certainly encourages the investigation of 6G networks as the answer for the future. This research includes fundamental privacy and security issues related to 6G technology. Keeping an eye on real-time systems requires secure wireless sensor networks (WSNs). Denial of service (DoS) attacks mark a significant security vulnerability that WSNs face, and they can compromise the system as a whole. This research proposes a novel method in blockchain 6G-based wireless network security management and optimization using a machine learning model. In this research, the deployed 6G wireless sensor network security management is carried out using a blockchain user datagram transport protocol with reinforcement projection regression. Then, the network optimization is completed using artificial democratic cuckoo glowworm remora optimization. The simulation results have been based on various network parameters regarding throughput, energy efficiency, packet delivery ratio, end-end delay, and accuracy. In order to minimise network traffic, it also offers the capacity to determine the optimal node and path selection for data transmission. The proposed technique obtained 97% throughput, 95% energy efficiency, 96% accuracy, 50% end-end delay, and 94% packet delivery ratio.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Security in 6G-Based Autonomous Vehicular Networks: Detecting Network Anomalies With Decentralized Federated Learning
    Zhang, Jiazhen
    Luo, Chunbo
    Jiang, Yuhong
    Min, Geyong
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2025,
  • [2] GCWCN: 6G-Based Global Coverage Wireless Communication Network Architecture
    Wang, Chao
    Zhang, Peiying
    Kumar, Neeraj
    Liu, Lei
    Yang, Tingting
    IEEE NETWORK, 2023, 37 (03): : 218 - 223
  • [3] Improving Network Security Using Machine Learning Techniques
    Akbar, Shaik
    Chandulal, J. A.
    Rao, K. Nageswara
    Kumar, G. Sudheer
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 76 - 80
  • [4] Radio optical network security analysis with routing in quantum computing for 5G wireless communication using blockchain machine learning model
    Wang, Fei
    Liao, Shasha
    Yin, Yu
    Ni, Rui
    Zhang, Yichao
    OPTICAL AND QUANTUM ELECTRONICS, 2023, 55 (11)
  • [5] A Survey: Machine Learning Based Security Analytics Approaches and Applications of Blockchain in Network Security
    Chen, Lin
    Lv, Huahui
    Fan, Kai
    Yang, Hang
    Kuang, Xiaoyun
    Xu, Aidong
    Yang, Yiwei
    2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 17 - 22
  • [6] Machine learning techniques based on security management in smart cities using robots
    Zhang, Mengqi
    Wang, Xi
    Sathishkumar, V. E.
    Sivakumar, V
    WORK-A JOURNAL OF PREVENTION ASSESSMENT & REHABILITATION, 2021, 68 (03): : 891 - 902
  • [7] Wireless network optimization method based on cognitive cycle using machine learning
    Oshima, Koji
    Kobayashi, Takumu
    Taenaka, Yuki
    Kuroda, Kaori
    Hasegawa, Mikio
    IEICE COMMUNICATIONS EXPRESS, 2018, 7 (07): : 278 - 283
  • [8] Enhancing Network Security using Hybrid Machine Learning Techniques
    Sirenjeevi, P.
    Dhanakoti, V.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [9] Security for the Metaverse: Blockchain and Machine Learning Techniques for Intrusion Detection
    Truong, Vu Tuan
    Le, Long Bao
    IEEE NETWORK, 2024, 38 (05): : 204 - 212
  • [10] RETRACTED: Smart Grid Security Based on Blockchain with Industrial Fault Detection Using Wireless Sensor Network and Deep Learning Techniques (Retracted Article)
    Kandasamy, Manivel
    Anto, S.
    Baranitharan, K.
    Rastogi, Ravi
    Satwik, Gunda
    Sampathkumar, A.
    JOURNAL OF SENSORS, 2023, 2023