Selective blockchain system for secure and efficient D2D communication

被引:9
|
作者
Yang, Dana [1 ]
Yoo, Seohee [1 ]
Doh, Inshil [2 ]
Chae, Kijoon [1 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Ewha Womans Univ, Dept Cyber Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
D2D; Identity impersonation; Wiretapping; Free-riding; IoT; Authentication; Smart registration; Blockchain;
D O I
10.1016/j.jnca.2020.102817
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of a hyper-connected society, expectations for blockchain technology and its potential have increased. Blockchain technology is emerging as a method to solve security vulnerabilities in the IoT and mobile devices that are already used in various industrial fields. However, the security problem is still one of the most critical issues. The conventional blockchain has a problem in which the performance decreases as the number of participants increases because all of the users participate in the verification. As a result, it is not suitable for traditional IoT and mobile environments in which resources are limited. This work presents an approach of applying a blockchain system in a D2D (Device-to-Device) environment and proposes solutions for the problems of conventional mobile device communication and blockchain consensus algorithms. After a blockchain system in a wireless network environment is separated into an off-blockchain and an on-blockchain, the divided blockchains are processed in three steps. In the first stage of 0ff-blockchain, our proposal confirms the safety of IoT devices that transfer confidential data. In the next stage, the devices reduce the risk of eavesdropping from a third party by calculating the security capacity using the resources of the mobile devices which register for membership on a private blockchain. In the last stage, the devices join the blockchain consensus process. The reliability of the consensus and the performance of the system are improved through calculation of the real participation probability of the participants by the communication elements and by determining whether each node is a selfish participant. As a result, our work proposes a consensus algorithm suitable for D2D communication and a SBC(Selective Blockchain) system considering environmental characteristics.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Research on D2D Communication
    Chen, Fangni
    Wang, Zhongpeng
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 2563 - 2570
  • [22] Secure and privacy-preserving D2D communication in fog computing services
    Ogundoyin, Sunday Oyinlola
    Kamil, Ismaila Adeniyi
    COMPUTER NETWORKS, 2022, 210
  • [23] An artificial noise scheme for secure communication in heterogeneous D2D and cellular networks
    2016, Institute of Electrical and Electronics Engineers Inc., United States (00):
  • [24] Resource allocation algorithm for secure communication in UAV-assisted D2D communication network
    Zeng X.
    Wang H.
    Huang L.
    Ma D.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (02): : 115 - 126
  • [25] Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching
    Rocha, Acquila Santos
    Pinheiro, Billy Anderson
    Borges, Vinicius C. M.
    PERVASIVE AND MOBILE COMPUTING, 2021, 77 (77)
  • [26] Joint Transaction Relaying and Block Verification Optimization for Blockchain Empowered D2D Communication
    Jiang, Li
    Xie, Shengli
    Maharjan, Sabita
    Zhang, Yan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (01) : 828 - 841
  • [27] Communication and Energy Efficient Decentralized Learning Over D2D Networks
    Liu, Shengli
    Yu, Guanding
    Wen, Dingzhu
    Chen, Xianfu
    Bennis, Mehdi
    Chen, Hongyang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 9549 - 9563
  • [28] Energy-Efficient D2D Communication under Downlink HetNets
    Algedir, Amal
    Refai, Hazem H.
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [29] Crystals kyber cryptographic algorithm for efficient IoT D2d communication
    Selvakumar, S.
    Ahilan, A.
    Sujitha, B. Ben
    Muthukumaran, N.
    WIRELESS NETWORKS, 2025, 31 (02) : 1053 - 1070
  • [30] Resource Reuse for D2D Communication in LTE Networks by Efficient Grouping
    Kuo, Fang-Chang
    Wang, Hwang-Cheng
    Ting, Kuo-Chang
    Xu, Jia-Hao
    Tseng, Chih-Cheng
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (01) : 135 - 150