Selective blockchain system for secure and efficient D2D communication

被引:9
|
作者
Yang, Dana [1 ]
Yoo, Seohee [1 ]
Doh, Inshil [2 ]
Chae, Kijoon [1 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Ewha Womans Univ, Dept Cyber Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
D2D; Identity impersonation; Wiretapping; Free-riding; IoT; Authentication; Smart registration; Blockchain;
D O I
10.1016/j.jnca.2020.102817
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of a hyper-connected society, expectations for blockchain technology and its potential have increased. Blockchain technology is emerging as a method to solve security vulnerabilities in the IoT and mobile devices that are already used in various industrial fields. However, the security problem is still one of the most critical issues. The conventional blockchain has a problem in which the performance decreases as the number of participants increases because all of the users participate in the verification. As a result, it is not suitable for traditional IoT and mobile environments in which resources are limited. This work presents an approach of applying a blockchain system in a D2D (Device-to-Device) environment and proposes solutions for the problems of conventional mobile device communication and blockchain consensus algorithms. After a blockchain system in a wireless network environment is separated into an off-blockchain and an on-blockchain, the divided blockchains are processed in three steps. In the first stage of 0ff-blockchain, our proposal confirms the safety of IoT devices that transfer confidential data. In the next stage, the devices reduce the risk of eavesdropping from a third party by calculating the security capacity using the resources of the mobile devices which register for membership on a private blockchain. In the last stage, the devices join the blockchain consensus process. The reliability of the consensus and the performance of the system are improved through calculation of the real participation probability of the participants by the communication elements and by determining whether each node is a selfish participant. As a result, our work proposes a consensus algorithm suitable for D2D communication and a SBC(Selective Blockchain) system considering environmental characteristics.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Efficient Mode Selection for D2D Communication in Industrial IoT Networks
    Jameel, Furqan
    Sheikh, Muhammad Usman
    Jantti, Riku
    Ashraf, Muhammad Ikram
    Torsner, Johan
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [32] Efficient feedback mechanism for LTE-based D2D communication
    Yoon, Hoyoung
    Park, Seungil
    Choi, Sunghyun
    PERVASIVE AND MOBILE COMPUTING, 2018, 48 : 137 - 152
  • [33] Resource Reuse for D2D Communication in LTE Networks by Efficient Grouping
    Fang-Chang Kuo
    Hwang-Cheng Wang
    Kuo-Chang Ting
    Jia-Hao Xu
    Chih-Cheng Tseng
    Wireless Personal Communications, 2019, 106 : 135 - 150
  • [34] The Application of D2D Communication Used in Train Control System
    Wang, Peng
    Li, Kaicheng
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 155 - 159
  • [35] Secure Caching in D2D Content Sharing
    Qu, Junyue
    Zhou, Liang
    Zhang, Guangchun
    Wu, Dan
    Zheng, Jianchao
    Cai, Yueming
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [36] Secure green D2D communication in OFDMA based networks with imperfect channel knowledge
    Arian, Fateme
    Javan, Mohammad Reza
    Yamchi, Nader Mokari
    WIRELESS NETWORKS, 2021, 27 (05) : 3147 - 3164
  • [37] SURAKSIT: A Secure Resource Allocation Scheme Using Whale Optimization for D2D Communication
    Jadav, Nilesh Kumar
    Tanwar, Sudeep
    10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES, CONECCT 2024, 2024,
  • [38] Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme
    Hassan N. Noura
    Reem Melki
    Rouwaida Kanj
    Ali Chehab
    Wireless Networks, 2021, 27 : 557 - 574
  • [39] A Lightweight Key Generation Scheme for Secure Device-to-Device (D2D) Communication
    Lou, Chunwei
    Cao, Mingsheng
    Wu, Rongchun
    Chen, Dajiang
    Xu, Hua
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021 (2021):
  • [40] Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme
    Noura, Hassan N.
    Melki, Reem
    Kanj, Rouwaida
    Chehab, Ali
    WIRELESS NETWORKS, 2021, 27 (01) : 557 - 574