Skip to main content

Advertisement

Log in

Davis Mayer Streebog Cryptographic Hash-Based Blockchain for Secure Transaction Management Using SDN in IIoT Applications

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

Abstract

Software-Defined Networking (SDN) is the network architecture used to simplify data management and facilitate communication network innovation. Security has been a more important task in the Industrial Internet of Things (IIoT) using SDN communication networks due to the network complexities. Moreover, communication still faces challenges in ensuring security and privacy to protect from security attacks and offers reliable financial services in IIoT. Davis Mayer Streebog Cryptographic Blockchain-based Secured Data Transaction (DMSCB-SDT) framework is introduced in SDN to improve secure data communication. The DMSCB-SDT framework aims to perform data transactions via the SDN using a blockchain-based network in the financial service industry. The DMSCB-SDT framework is designed with the integration of blockchain and the Streebog Cryptographic hash function. At first, the input data are separated into different blocks. Streebog cryptographic hash function uses the Davis Mayer compression function for producing the hash for each data block to perform the encryption process. After that, the original data is altered into ciphertext in the form of the hash value. Next, the data is transmitted to the receiver for performing decryption for obtaining the original data with a similar key. The unauthorized entity is avoided to protect the original data. As a result, the DMSCB-SDT framework ensures security and confidentiality to preserve the data and provide better communication. The statistical analysis and results show that the DMSCB-SDT framework achieves better security in terms of a higher confidentiality rate, dynamically minimizing the processing time of secure data transactions, and minimizing the computation overhead than the other state-of-the-art works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

Data Availability

Not Applicable.

References

  1. Vijay, K. S. (2019). IoT Applications in Finance and Banking. International Journal of Research and Analytical Reviews (IJRAR).

  2. Al-Rubaye, S., Kadhum, E., Ni, Q., & Anpalagan, A. (2017). Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency. IEEE Internet of Things Journal., 6(1), 267–277.

    Article  Google Scholar 

  3. Islam, M. R., & Aktheruzzaman, K. M. (2020). An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions. Journal of Computer and Communications, 8(4).

  4. Aujla, G. S., Singh, M., Bose, A., Kumar, N., Han, G., & Buyya, R. (2020). BlockSDN: Blockchain-as-a-Service for Software Defined Networking in Smart City Applications. IEEE Network, 1–9.

  5. Yazdinejad, A., Parizi, R. M., & Dehghantanha, A. (2019). Kim-Kwang Raymond Choo, “P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.” Computers & Security, Elsevier, 88, 1–14.

    Google Scholar 

  6. Sharma, P. K., & Park, J. H. (2018). Blockchain based hybrid network architecture for the smart city. Future Generation Computer Systems, Elsevier, 86, 650–655.

    Article  Google Scholar 

  7. Zhao, Qi., Zhang, C., & Zhao, Z. (2017). A decoy chain deployment method based on SDN and NFV against penetration attack. PLoS ONE, 12(12), 1–23.

    Article  MathSciNet  Google Scholar 

  8. Meng, W., Li, W., & Zhou, J. (2021). Enhancing the security of blockchain-based software-defined networking through trust-based traffic fusion and filtration. Information Fusion, Elsevier, 60, 60–71.

    Article  Google Scholar 

  9. Lakhan, A., Mohammed, M. A., Kadry, S., AlQahtani, S. A., Maashi, M. S., & Abdulkareem, K. H. (2022). Federated Learning-Aware Multi-Objective Modeling and blockchain-enable system for IIoT applications. Computers and Electrical Engineering100, 107839. Elsevier.

  10. Banerjee, S., Bera, B., Das, A. K., Chattopadhyay, S., Khan, M. K., & Rodrigues, J. J. (2021). Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT. Computer Communications169, 99-113.

  11. Derhab, A., Guerroumi, M., Belaoued, M., & Cheikhrouhou, O. (2021). BMC-SDN: blockchain-based multicontroller architecture for secure software-defined networks. Wireless Communications and Mobile Computing2021, 1–12.

  12. Kaliyamurthy, N. M., Taterh, S., Shanmugasundaram, S., Saxena, A., Cheikhrouhou, O., & Ben Elhadj, H. (2021). Software-Defined Networking: An Evolving Network Architecture—Programmability and Security Perspective. Security and Communication Networks2021, 17.

  13. Lam, J., Lee, S. G., Lee, H. J., & Oktian, Y. E. (2016). Securing SDN southbound and data plane communication with IBC. Mobile Information Systems2016, 1–12.

  14. Rajeesh Kumar, N. V., Mohan Kumar, P. (2020). Application of SDN for secure communication in IoT environment. Computer Communications, 151, 60–65. Elsevier.

  15. Wang, H., Zhao, Y., Li, Y., Xiaosong, Yu., Zhang, J., Liu, C., & Shao, Qi. (2018). A flexible key-updating method for software-defined optical networks secured by quantum key distribution. Optical Fiber Technology, Elsevier, 45, 195–200.

    Article  Google Scholar 

  16. Ellinidou, S., Sharma, G., Rigas, T., Vanspouwen, T., Markowitch, O., & Dricot, J. M. (2019). SSPSoC: A secure SDN-based protocol over MPSoC. Security and Communication Networks2019, 1–11.

  17. Liu, Y., Kuang, Y., Xiao, Y., & Guangxia, Xu. (2018). SDN-Based Data Transfer Security for Internet of Things. IEEE Internet of Things Journal, 5(1), 257–268.

    Article  Google Scholar 

  18. Yan, Z., Zhang, P., & Vasilakos, A. V. (2016). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks, Wiley, 9, 3059–3069.

    Article  Google Scholar 

  19. Chen, Y., Jia, H., Huang, K., Lan, J., & Yan, X. (2016). A secure network coding based on broadcast encryption in sdn. Mathematical Problems in Engineering2016, 1–8.

  20. Jun, Wu., Dong, M., Ota, K., Li, J., & Guan, Z. (2018). Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks. IEEE Transactions on Network and Service Management, 15(1), 27–38.

    Article  Google Scholar 

  21. Wang, Li., & Dinghao, Wu. (2018). Bridging the Gap between Security Tools and SDN Controllers. EAI Endorsed Transactions on Security and Safety, 5(17), 1–16.

    Google Scholar 

  22. Kim, J. A., Park, D. G., & Jeong, J. (2019). Design and performance evaluation of cost-effective function-distributed mobility management scheme for software-defined smart factory networking. Journal of Ambient Intelligence and Humanized Computing, 1–17.

  23. Rebecchi, F., Boite, J., Nardin, P.-A., Bouet, M., & Conan, V. (2018). DDoS protection with stateful software-defined networking. International journal of network management, 29(1), 1–19.

    Google Scholar 

  24. Chuanfeng, Xu., Lin, H., Yulei, Wu., Guo, X., & Lin, W. (2019). An SDNFV-Based DDoS Defense Technology for Smart Cities. IEEE Access, 7, 137856–137874.

    Article  Google Scholar 

  25. Sahoo, K. S., Panda, S. K., Sahoo, S., Sahoo, B., & Dash, R. (2019) Toward secure software-defined networks against distributed denial of service attack. The Journal of Supercomputing, Elsevier, 75, 4829–4874.

    Article  Google Scholar 

  26. Bawany, N. Z., & Shamsi, J. A. (2019). SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks. Journal of Network and Computer Applications145, 1–35.

  27. Varadharajan, V., Karmakar, K., Tupakula, U., & Hitchens, M. (2019). A Policy-Based Security Architecture for Software-Defined Networks. IEEE Transactions on Information Forensics and Security, 14(4), 897–912.

    Article  Google Scholar 

  28. Sood, K. (2019). Kallol Krishna Karmakar, Vijay Varadharajan, Uday Tupakula, and Shui Yu, “Analysis of Policy-Based Security Management System in Software-Defined Networks.” IEEE Communications Letters, 23(4), 612–615.

    Article  Google Scholar 

  29. 1999 Czech financial dataset - real anonymized transactions - dataset by lpetrocelli. data. world, 13-Dec-2019. Retrived date January 02, 2022, from https://data.world/lpetrocelli/czech-financial-dataset-real-anonymized-transactions

  30. Wang, T., Bhuiyan, M. Z. A., Wang, G., Qi, L., Wu, J., & Hayajneh, T. (2019). Preserving balance between privacy and data integrity in edge-assisted Internet of Things. IEEE Internet of Things Journal, 7(4), 2679–2689.

    Article  Google Scholar 

  31. Ramachandran, M., Patan, R., Kumar, A., Hosseini, S., & Gandomi, A. H. (2021). Mutual informative MapReduce and minimum quadrangle classification for brain tumor big data. IEEE Transactions on Engineering Management.

  32. Kannan, C., Dakshinamoorthy, M., Ramachandran, M., Patan, R., Kalyanaraman, H., & Kumar, A. (2021). Cryptography-based deep artificial structure for secure communication using IoT-enabled cyber-physical system. IET Communications., 15(6), 771–779.

    Article  Google Scholar 

  33. Mekala, M. S., Rizwan, P., & Khan, M. S. (2021). Computational intelligent sensor-rank consolidation approach for industrial internet of things (iiot). IEEE Internet of Things Journal.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sivaram Rajeyyagari.

Ethics declarations

Conflict of Interests

There is no conflict of interest between the authors to publish this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alahmari, S.A., Rajeyyagari, S. & Al-Turjman, F. Davis Mayer Streebog Cryptographic Hash-Based Blockchain for Secure Transaction Management Using SDN in IIoT Applications. J Sign Process Syst 95, 241–252 (2023). https://doi.org/10.1007/s11265-022-01825-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-022-01825-9

Keywords

Navigation