Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques

被引:2
|
作者
Chinnasamy, Ponnusamy [1 ]
Babu, G. Charles [2 ]
Ayyasamy, Ramesh Kumar [3 ]
Amutha, S. [4 ]
Sinha, Keshav [5 ]
Balaram, Allam [6 ]
机构
[1] Kalasalingam Acad Res & Educ, Sch Comp, Dept Comp Sci & Engn, Srivilliputtur 626126, Tamil Nadu, India
[2] Gokaraju Rangaraju Inst Engn & Technol, Dept Comp Sci & Engn, Hyderabad 500090, Telangana, India
[3] Univ Tunku Abdul Rahman UTAR, Fac Informat & Commun Technol, Kampar 31900, Malaysia
[4] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Sch Comp, Dept Comp Sci & Engn, Chennai 600062, Tamil Nadu, India
[5] UPES, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[6] MLR Inst Technol, Dept Comp Sci & Engn, Hyderabad 500043, Telangana, India
关键词
blockchain; 6G networks; wireless network; security management; machine learning; SENSOR NETWORKS;
D O I
10.3390/s24186143
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks to satisfy. The limitations of 5G networks have been apparent with the deployment of more and more 5G networks, which certainly encourages the investigation of 6G networks as the answer for the future. This research includes fundamental privacy and security issues related to 6G technology. Keeping an eye on real-time systems requires secure wireless sensor networks (WSNs). Denial of service (DoS) attacks mark a significant security vulnerability that WSNs face, and they can compromise the system as a whole. This research proposes a novel method in blockchain 6G-based wireless network security management and optimization using a machine learning model. In this research, the deployed 6G wireless sensor network security management is carried out using a blockchain user datagram transport protocol with reinforcement projection regression. Then, the network optimization is completed using artificial democratic cuckoo glowworm remora optimization. The simulation results have been based on various network parameters regarding throughput, energy efficiency, packet delivery ratio, end-end delay, and accuracy. In order to minimise network traffic, it also offers the capacity to determine the optimal node and path selection for data transmission. The proposed technique obtained 97% throughput, 95% energy efficiency, 96% accuracy, 50% end-end delay, and 94% packet delivery ratio.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] An optimization-based machine learning technique for smart home security using 5G
    Sharma, Vidhu Kiran
    Mohapatra, Srikanta Kumar
    Shitharth, S.
    Yonbawi, Saud
    Yafoz, Ayman
    Alahmari, Sultan
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [32] Towards a lightweight security framework using blockchain and machine learning
    Ismail, Shereen
    Nouman, Muhammad
    Dawoud, Diana W.
    Reza, Hassan
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (01):
  • [33] Cognitive network management with optimization using network protocol and machine learning model
    Zheng, Yang
    Song, Ma Chang
    Qian, Wang
    Wei, Li
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [34] A Survey on Securing 6G Wireless Communications based Optimization Techniques
    Abasi, Ammar K.
    Aloqaily, Moayad
    Ouni, Bassem
    Guizani, Mohsen
    Debbah, Merouane
    Karray, Fakhri
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 216 - 223
  • [35] A machine learning based approach for 5G network security monitoring
    Chen B.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [36] Blockchain Empowered Federated Learning for Distributed Network Security Behaviour Knowledge Base in 6G
    Li, Kun
    Zhou, Huachun
    Tu, Zhe
    Liu, Feiyang
    Zhang, Hongke
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [37] Mobile edge computing based cognitive network security analysis using multi agent machine learning techniques in B5G
    Duan, Ying
    Wu, Qingtao
    Zhao, Xuezhuan
    Li, Xiaoyu
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [38] A Trusted Federated Incentive Mechanism Based on Blockchain for 6G Network Data Security
    Luo, Yihang
    Gong, Bei
    Zhu, Haotian
    Guo, Chong
    APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [39] Machine Learning in 6G Wireless Communications
    Ohtsuki, Tomoaki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (02) : 75 - 83
  • [40] Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models
    Affane, M. Anselme R.
    Satori, Hassan
    Boutazart, Youssef
    Ezzine, Abderahim
    Satori, Khalid
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 135 (04) : 1965 - 1992