Blockchain based integrated security measure for reliable service delegation in 6G communication environment

Abstract Sixth generation (6G) communication environment is unfolded in the recent years in order to provide high throughput less latency services for the mobile users. This environment encloses a variety of heterogeneous resources and communication standards to ensure seamless availability of services. In this open environment, security is a concerning issue due to heterogeneous standard integration and access delegations. This paper introduces blockchain-based integrated security measure (BISM) for providing secure access control and privacy preserving for the resources and the users. The access control process relies on the states of the virtualized resources at different time instances and the privacy preserving relies on longevity of service responses. The access delegation and denial is decided by the changeover of the states of the resources as aided by the Q-learning procedure for improving the service related performance. This performance for access control and privacy is verified using the metrics true positives, access denial and success ratio, access time and modification, memory utilization and time complexity.

[1]  Bülent Sankur,et al.  An intelligent cyber security system against DDoS attacks in SIP networks , 2018, Comput. Networks.

[2]  Shree Krishna Sharma,et al.  Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future , 2019, IEEE Access.

[3]  Neeraj Kumar,et al.  Blockchain-Based Distributed Framework for Automotive Industry in a Smart City , 2019, IEEE Transactions on Industrial Informatics.

[4]  Ghaida Muttashar Abdulsahib,et al.  A New Algorithm on Application of Blockchain Technology in Live Stream Video Transmissions and Telecommunications , 2020, Int. J. e Collab..

[5]  Elena Sitnikova,et al.  Privacy-preserving big data analytics for cyber-physical systems , 2018, Wireless Networks.

[6]  Feng Jia,et al.  Efficient Traceability Systems of Steel Products Using Blockchain-Based Industrial Internet of Things , 2020, IEEE Transactions on Industrial Informatics.

[7]  Jun Wu,et al.  A Survey on Green 6G Network: Architecture and Technologies , 2019, IEEE Access.

[8]  Dmitry P. Zegzhda,et al.  Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology , 2018, Autom. Control. Comput. Sci..

[9]  Neeraj Kumar,et al.  SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment , 2019, Comput. Networks.

[10]  Thomas Schlegel,et al.  Toward an execution system for self-healing workflows in cyber-physical systems , 2018, Software & Systems Modeling.

[11]  Jere Backman,et al.  Blockchain-Powered Value Creation in the 5G and Smart Grid Use Cases , 2019, IEEE Access.

[12]  P. Mohamed Shakeel,et al.  A decentralized scalable security framework for end‐to‐end authentication of future IoT communication , 2019, Trans. Emerg. Telecommun. Technol..

[13]  Ian F. Akyildiz,et al.  A Novel Communication Paradigm for High Capacity and Security via Programmable Indoor Wireless Environments in Next Generation Wireless Systems , 2018, Ad Hoc Networks.

[14]  Haijun Zhang,et al.  Software Defined 5G and 6G Networks: a Survey , 2019, Mobile Networks and Applications.

[15]  Ilsun You,et al.  GRBC-based Network Security Functions placement scheme in SDS for 5G security , 2018, J. Netw. Comput. Appl..

[16]  Félix J. García Clemente,et al.  Towards the autonomous provision of self-protection capabilities in 5G networks , 2019, J. Ambient Intell. Humaniz. Comput..

[17]  Usman Ahmad,et al.  CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks , 2018, The Journal of Supercomputing.

[18]  Sherali Zeadally,et al.  A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..

[19]  Mohammad S. Obaidat,et al.  BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[20]  P. Mohamed Shakeel,et al.  An energy persistent Range-dependent Regulated Transmission Communication model for vehicular network applications , 2019, Comput. Networks.

[21]  Kun Jia,et al.  Dynamical model for individual defence against cyber epidemic attacks , 2019, IET Inf. Secur..

[22]  Hao Peng,et al.  Security Assessment for Interdependent Heterogeneous Cyber Physical Systems , 2019, Mobile Networks and Applications.

[23]  Bao-yan Duan Evolution and innovation of antenna systems for beyond 5G and 6G , 2020, Frontiers of Information Technology & Electronic Engineering.

[24]  Günther Pernul,et al.  A secure and auditable logging infrastructure based on a permissioned blockchain , 2019, Comput. Secur..

[25]  Muhammad Imran,et al.  Securing IoTs in distributed blockchain: Analysis, requirements and open issues , 2019, Future Gener. Comput. Syst..

[26]  Chen Wang,et al.  Recent advances in consensus protocols for blockchain: a survey , 2019, Wireless Networks.

[27]  Félix J. García Clemente,et al.  Dynamic management of a deep learning-based anomaly detection system for 5G networks , 2018, Journal of Ambient Intelligence and Humanized Computing.

[28]  Giacomo Morabito,et al.  On the use of Blockchain technologies in WiFi networks , 2019, Comput. Networks.

[29]  Zheng Yan,et al.  MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain , 2019, Future Gener. Comput. Syst..

[30]  Dingde Jiang,et al.  A Blockchain-Based Security Traffic Measurement Approach to Software Defined Networking , 2020 .

[31]  Peng Zhao,et al.  Modeling Network Systems Under Simultaneous Cyber-Attacks , 2019, IEEE Transactions on Reliability.

[32]  Dmitry P. Zegzhda,et al.  Cyber-sustainability of Software-Defined Networks Based on Situational Management , 2018, Autom. Control. Comput. Sci..

[33]  Debiao He,et al.  SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system , 2020, Science China Information Sciences.