Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques

被引:2
|
作者
Chinnasamy, Ponnusamy [1 ]
Babu, G. Charles [2 ]
Ayyasamy, Ramesh Kumar [3 ]
Amutha, S. [4 ]
Sinha, Keshav [5 ]
Balaram, Allam [6 ]
机构
[1] Kalasalingam Acad Res & Educ, Sch Comp, Dept Comp Sci & Engn, Srivilliputtur 626126, Tamil Nadu, India
[2] Gokaraju Rangaraju Inst Engn & Technol, Dept Comp Sci & Engn, Hyderabad 500090, Telangana, India
[3] Univ Tunku Abdul Rahman UTAR, Fac Informat & Commun Technol, Kampar 31900, Malaysia
[4] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Sch Comp, Dept Comp Sci & Engn, Chennai 600062, Tamil Nadu, India
[5] UPES, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[6] MLR Inst Technol, Dept Comp Sci & Engn, Hyderabad 500043, Telangana, India
关键词
blockchain; 6G networks; wireless network; security management; machine learning; SENSOR NETWORKS;
D O I
10.3390/s24186143
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks to satisfy. The limitations of 5G networks have been apparent with the deployment of more and more 5G networks, which certainly encourages the investigation of 6G networks as the answer for the future. This research includes fundamental privacy and security issues related to 6G technology. Keeping an eye on real-time systems requires secure wireless sensor networks (WSNs). Denial of service (DoS) attacks mark a significant security vulnerability that WSNs face, and they can compromise the system as a whole. This research proposes a novel method in blockchain 6G-based wireless network security management and optimization using a machine learning model. In this research, the deployed 6G wireless sensor network security management is carried out using a blockchain user datagram transport protocol with reinforcement projection regression. Then, the network optimization is completed using artificial democratic cuckoo glowworm remora optimization. The simulation results have been based on various network parameters regarding throughput, energy efficiency, packet delivery ratio, end-end delay, and accuracy. In order to minimise network traffic, it also offers the capacity to determine the optimal node and path selection for data transmission. The proposed technique obtained 97% throughput, 95% energy efficiency, 96% accuracy, 50% end-end delay, and 94% packet delivery ratio.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Prediction and evaluation of wireless network data transmission security risk based on machine learning
    Huang, Bo
    Yao, Huidong
    Wu, Qing Bin
    WIRELESS NETWORKS, 2025, 31 (01) : 405 - 416
  • [42] Study of blockchain-based 6G wireless network integration and consensus mechanism
    Verma A.
    Singh P.
    Singh N.
    International Journal of Wireless and Mobile Computing, 2021, 21 (03) : 255 - 264
  • [43] Ensuring Security and Energy Efficiency of Wireless Sensor Network by Using Blockchain
    Rehman, Abdul
    Abdullah, Saima
    Fatima, Muqaddas
    Iqbal, Muhammad Waseem
    Almarhabi, Khalid Ali
    Ashraf, M. Usman
    Ali, Saqib
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [44] Machine Learning-Based Trust Management in Cloud Using Blockchain Technology
    Benjamin Franklin I.
    Paul Arokiadass Jerald M.
    Bhuvaneswari R.
    SN Computer Science, 3 (6)
  • [45] Combining Machine Learning and Behavior Analysis Techniques for Network Security
    Brzezinski Meyer, Maria Laura
    Labit, Yann
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 580 - 583
  • [46] A Normalized Slicing-assigned Virtualization Method for 6G-based Wireless Communication Systems
    Alharbi, Abdullah
    Aljebreen, Mohammed
    Tolba, Amr
    Lizos, Konstantinos A.
    Abd El-Atty, Saied
    Shawki, Farid
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2022, 18 (03)
  • [47] Review-Machine Learning Techniques in Wireless Sensor Network Based Precision Agriculture
    Mekonnen, Yemeserach
    Namuduri, Srikanth
    Burton, Lamar
    Sarwat, Arif
    Bhansali, Shekhar
    JOURNAL OF THE ELECTROCHEMICAL SOCIETY, 2019, 167 (03)
  • [48] Machine Learning-Based Transactions Anomaly Prediction for Enhanced IoT Blockchain Network Security and Performance
    Abdullah, Nor Fadzilah
    Kairaldeen, Ammar Riadh
    Abu-Samah, Asma
    Nordin, Rosdiadee
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (07): : 1986 - 2009
  • [49] Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
    Waheed, Nazar
    He, Xiangjian
    Ikram, Muhammad
    Usman, Muhammad
    Hashmi, Saad Sajid
    ACM COMPUTING SURVEYS, 2021, 53 (06)
  • [50] Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
    Venkatesan, K.
    Rahayu, Syarifah Bahiyah
    SCIENTIFIC REPORTS, 2024, 14 (01)