Abstract
Secured data transmission and data sharing have always been a challenge on the Internet of things-based networks. Blockchain-enabled peer to peer (P2P) networks are suitable infrastructure for the Internet of Things (IoT) and Beyond 5G (B5G) applications. The advantage is that the distributed nature of architecture and security services provided by this network extends its use in all sort of financial transactions. There are many issues related to IoT based networks; Heterogeneous IoT devices, security, energy issues. This paper implements data security by employing private blockchain in SDN and public blockchain for peer to peer communication and a secured authentication method to validate the blocks in the network. To increase confidentiality and non-repudiation, it implements an additional component; here, the sender signs the particular operation while transferring the data from one user to another user. It is published with a public key and Public-key value-based signature generated with the private key of the transaction. Nodes authenticate this operation based on Public key value-based signature thus generated. The cryptography with hashing process provides better immutability. The results show enhanced security during data transmission and improved throughput, response time, reduction in end-to-end delay and overhead when compared to the existing methods. This work uses Pyethereum tester tool under the Ethereum platform.
Similar content being viewed by others
References
Kahina Khacef, Guy Pujolle, (2019), "Secure Peer-to-Peer communication based on Blockchain",Workshops of the International Conference on Advanced Information Networking and Applications WAINA 2019: Web, Artificial Intelligence and Network Applications pp 662-672
Irani Acharjamayum, Ripon Patgiri, Dhruwajita Devi,"Blockchain: A Tale of Peer to Peer Security",IEEE Symposium Series on Computational Intelligence SSCI 2018,978–1–5386-9276-9/18/$31.00c 2018 IEEE
Leila Ismail, Huned Materwala, Symmetry-MDPI, 2019, doi:https://doi.org/10.3390/sym11101198, Article A Review of Blockchain Architecture and Consensus Protocols: Use Cases, Challenges, and Solutions
B. Remote Procedure Call—Wikipedia.Available online: https://en.wikipedia.org/wiki/ Remote procedure call. (accessed- November 2019)
Web API—Wikipedia. Available online: https://en.wikipedia.org/wiki/Web_API (accessed -November 2019)
Merkle RC (1988) “A Digital Signature Based on a Conventional Encryption Function”, Proceedings of the Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO 87, Santa Barbara, CA, USA, 23–27 August 1988. Springer, London, pp 369–378
Swan F, Blockchain M (2015) Blueprint for a new economy. O’Reilly Media, Inc., Newton
K. Gai, Y. Wu, L. Zhu, L. Xu, and Y. Zhang, “Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks”, IEEE Internet of Things Journal, 2019, Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks
Zhang Z, Xiao Y, Ma Z, Xiao M, Ding Z, Lei X, Karagiannidis GK, Fan P (2019) 6G wireless networks: vision, requirements, architecture, and key technologies. IEEE Veh Technol Mag 14(3):28–41
J. Qiu, D. Grace, G. Ding, J. Yao, and Q. Wu, “Blockchain-based secure spectrum trading for unmanned aerial vehicle assisted cellular networks: an operators perspective”, IEEE Internet of Things Journal,2019
R. M. Parizi, Amritraj, and A. Dehghantanha, “Smart contract programming languages on blockchains: An empirical evaluation of usability and security”, in International Conference on Blockchain, pp. 75–91, Springer, 2018
M. Mettler, “Blockchain technology in healthcare: The revolution Starts Here”, in 2016 IEEE 18th International Conference on e-HealthNetworking, Applications and Services (Healthcom), pp. 1–3, IEEE, 2016
M. Pilkington, “11 blockchain technology: principles and applications,” Research handbook on digital transformations, vol. 225, 2016
R. M. Parizi, A. Dehghantanha, K.-K. R. Choo, and A. Singh, “Empirical vulnerability analysis of automated smart contractssecurity testing on blockchains”, in Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, pp. 103–113, IBM Corp., 2018
P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K.- K. R. Choo, “A systematic literature review of blockchain cybersecurity”, Digital Communications and Networks, 2019
R. M. Parizi and A. Dehghantanha, “On the understanding of gamification in blockchain systems”,in 2018 6th International Conferenceon Future Internet of Things and Cloud Workshops (FiCloudW), pp. 214–219, IEEE, 2018
S. R. Basnet and S. Shakya, “Bss: Blockchain security over software defined network”, 2017 International Conference on Computing, Communication and Automation (ICCCA), pp. 720–725, IEEE, 2017
S. Huh, S. Cho, and S. Kim, “Managing IoT devices using blockchain platform,” 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 464–467, IEEE, 2017
A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards an optimized blockchain for IoT”, Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 173–178, ACM, 2017
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanhaand, Kim-Kwang Raymond Choo, "P4-to-Blockchain: A Secure Blockchain-enabled Packet Parser for Software Defined Networking", Computers & Security • 2019, doi: https://doi.org/10.1016/j.cose.2019.101629
Reza M. Parizi, Sajad Homayoun, Abbas Yazdinejad, Ali Dehghantanha, Kim-Kwang Raymond Choo,"integrating privacy enhancing techniques intoBlockchains using Sidechains", proceedings of the 32nd IEEE candian conference on electrical and computer engineering, 2019
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Qi Zhang, Kim-Kwang Raymond Choo,"an energy-efficient SDN controller architecture for IoT networks with Blockchain-based security", IEEE Trans Serv Comput, 2020
SanazKavianpour BS, Azam S, Zamani M, Samy GN, De Boer F (2019, Article ID 5747136, 14 pages) A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices. J Comput Netw Commun. https://doi.org/10.1155/2019/574713
J. Wang, L. Wu, K.-K. R. Choo, and D. He, “Blockchain based anonymous authentication with key management for smart grid edge computing infrastructure”, IEEE Transactions on Industrial Informatics, 2019
L. Xiong and L. et al., “A blockchain-based privacy-awareness authentication scheme with efficient revocation for multi-server architectures”, IEEE Access, vol. 7, pp. 125 840–125 853, 2019
J. Wan, J. Li, M. Imran, D. Li et al., IEEE Transactions on Industrial Informatics, 2019, A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory
Z. Lu, Q. Wang, G. Qu, H. Zhang, and Z. Liu, “A blockchain-based privacy-preserving authentication scheme for vanets,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019
Li L, Liu J, Cheng L, Qiu S, Wang W, Zhang X, Zhang Z (2018) Creditcoin: a privacy-preserving blockchain-based incentive announcementnetwork for communications of smart vehicles. IEEE Trans Intell Transp Syst 19(7):2204–2220
Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Futur Gener Comput Syst 97:512–529
M. Ma, G. Shi, and F. Li, “Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario”, IEEE Access, vol. 7, pp. 34 045–34 059, 2019
S. Ding, J. Cao, C. Li, K. Fan, and H. Li, “A novel attribute-based access control scheme using blockchain for IoT,” IEEE Access, vol. 7,pp. 38 431–38 441, 2019
Z. Liu, L. Gao, Y. Liu, X. Guan, K. Ma, and Y. Wang, IEEE Transactions on Industrial Informatics, 2019, Efficient QoS Support for Robust Resource Allocation in Blockchain-based Femtocell Networks
Yang M, Margheri A, Hu R, Sassone V (2018) Differentially private data sharing in a cloud federation with blockchain. IEEE Cloud Computing 5(6):69–79
Y. Liu, R. Yu, X. Li, H. Ji, and V. C. Leung, IEEE Transactions on VehicularTechnology, 2019, Decentralized Resource Allocation for Video Transcoding and Delivery in Blockchain-Based System With Mobile Edge Computing
M. B. Weiss, K. Werbach, D. C. Sicker, and C. Caicedo, IEEE Transactions on Cognitive Communications and Networking, 2019, On the Application of Blockchains to Spectrum Management
Kotobi K, Bilen SG (2018) Secure blockchains for dynamic spectrum access: a decentralized database in moving cognitive radio networksenhances security and user access. IEEE Veh Technol Mag 13(1):32–39
W. Liang, M. Tang, J. Long, X. Peng, J. Xu, and K.-C. Li, “A securefabric blockchain-based data transmission technique for industrial internet-of-things”,IEEE Transactions on Industrial Informatics, 2019
C. H. Liu, Q. Lin, and S. Wen, “Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning”, IEEETransactions on Industrial Informatics, 2018
Li D, Du R, Fu Y, Au MH (2019) Meta-key: a secure data-sharing protocol under blockchain-based decentralized storage architecture. IEEE Networking Lett 1(1):30–33
Fan K, Ren Y, Wang Y, Li H, Yang Y (2017) Blockchain-basedefficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun 12(5):527–532
Y. Zhang, C. Xu, X. Lin, and X. S. Shen, IEEE Transactions on Cloud Computing, 2019, Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
Aakanksha Tewari and B.B. Gupta, "A novel ECC-based lightweight authentication protocol for internet of things devices", Int. J. High Performance Computing and Networking, Vol. 15, Nos. 1/2, 2019
Haoxuan Li, Hui Huang, Shichong Tan, Ning Zhang and Xiaotong Fu,"A new revocable reputation evaluation system based on blockchain", Int. J. High Performance Computing and Networking, Vol. 14, No. 3, 2019
Christos Stergiou, Kostas E.Psannis, Brij B. Gupta and Yutaka Ishibashi, "Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT",Sustainable Computing: Informatics and Systems,Volume 19, September 2018, Pages 174–184
Aakanksha Tewari BB (2020) Gupta, "security, privacy and trust of different layers in internet-of-things (IoTs) framework ". Future Generation Comput Syst 108:909–920
Berenjian SSaeed Hajizadeh and Reza Ebrahimi Atani, "an incentive security model to provide fairness for peer-to-peer networks",2019 IEEE conference on application. Inform Netw Secur (AINS). https://doi.org/10.1109/AINS47559.2019.8968699
Naghizadeh A, Berenjian S, Meamari E, Atani RE (2016) Structural-based tunneling: preserving mutual anonymity for circular P2P networks. Int J Commun Syst 29:602–619
Alireza Naghizadeh; Samaneh Berenjian ; Behrooz Razeghi; Saghi Shahanggar ; Nima Razagh Pour, "Preserving receiver's anonymity for circular structured P2P networks”, 2015 12th Annual IEEE Consumer Commun Netw Conference (CCNC), https://doi.org/10.1109/CCNC.2015.7157949
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on P2P Computing for Beyond 5G Network and Internet-of-Everything
Guest Editors: Prakasam P, Ajayan John, Shohel Sayeed
Rights and permissions
About this article
Cite this article
Sankar, S.P., Subash, T.D., Vishwanath, N. et al. Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things. Peer-to-Peer Netw. Appl. 14, 392–402 (2021). https://doi.org/10.1007/s12083-020-00971-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00971-w