Authors: Bhatnagar, Manisha | Thankachan, Dolly
Article Type:
Research Article
Abstract:
Trust enabled wireless networks use temporal behaviour information of nodes in order to classify them into different trust categories. This information is utilized by the router for high performance communication that is optimized in terms of end-to-end delay, energy consumption, throughput, packet delivery ratio, and other quality of service (QoS) parameters. Establishing security in trust enabled wireless networks is a difficult task, because high trust nodes might be compromised by external or internal attacks, thereby disrupting normal communication. In order to perform this task, blockchain based security models are deployed. These models provide high transparency, comprehensive traceability, distributed processing, and
…data immutability, which makes them highly deployable for trust enabled networks. Blockchain models enforce compulsive verification of data before communication, which makes them resilient to DDoS, MITM, denial of service, and other data-based attacks. In order to enforce these checks, each of the block is hashed, and the hash values are compared with every existing block in the chain. These checks include hash uniqueness, and hash pattern validations; the later of which is decided by the network designer(s). As the length of blockchain increases, computational complexity of adding a new block (a.k.a. blockchain mining) increases exponentially, which adds to the end-to-end delay, and energy consumption of wireless nodes, which is a drawback of these models. To avoid this, sidechains & blockchain sharding models are developed. These models work by dividing the existing blockchain into multiple parts (based on a certain pre-set criteria), and then use the parts for high speed and low power mining. But again, due to increase in number of sidechains, the computational complexity of managing these chains, and locating data blocks within them increases exponentially. Moreover, in any practical wireless network, there is a need to communicate modifiable data, which is not supported by current blockchain implementations. In order to resolve these issues, this text proposes a transformable blockchain sharding model, which is managed via a light weight meta heuristic method for high-speed data access. The proposed model aims at reducing computational complexity of sidechain maintenance with the help of directed acyclic graphs (DAGs) for storing of hash ranges. The model also incorporates a transformable blockchain solution, wherein the block structure is designed to incorporate selectively mutable as well as non-mutable information. Both the mutable and non-mutable information is encrypted using high performance elliptic curve cryptosystem, which makes it highly secure against network attacks. The proposed model showcases 15% improvement in network lifetime, 8% reduction in end-to-end delay, 22% reduction in computational complexity, and 18% improvement in network throughput when compared with various blockchain and sidechain based wireless networks, thereby assisting in development of a high QoS and highly secure wireless network.
Show more
Keywords: Wireless, trust-enabled, sharding, blockchain, meta heuristic, DAG
DOI: 10.3233/JIFS-213482
Citation: Journal of Intelligent & Fuzzy Systems,
vol. 44, no. 1, pp. 41-58, 2023
Price: EUR 27.50