Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques

被引:0
|
作者
Chinnasamy, Ponnusamy [1 ]
Babu, G. Charles [2 ]
Ayyasamy, Ramesh Kumar [3 ]
Amutha, S. [4 ]
Sinha, Keshav [5 ]
Balaram, Allam [6 ]
机构
[1] Department of Computer Science and Engineering, School of Computing, Kalasalingam Academy of Research and Education, Tamil Nadu, Srivilliputtur,626126, India
[2] Department of Computer Science and Engineering, Gokaraju Rangaraju Institute of Engineering and Technology, Bachupally, Telangana, Hyderabad,500090, India
[3] Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman (UTAR), Kampar,31900, Malaysia
[4] Department of Computer Science and Engineering, School of Computing, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Tamil Nadu, Chennai,600062, India
[5] School of Computer Science, UPES, Uttarakhand, Dehradun,248007, India
[6] Department of Computer Science and Engineering, MLR Institute of Technology, Telangana, Hyderabad,500043, India
关键词
Blockchain;
D O I
10.3390/s24186143
中图分类号
学科分类号
摘要
6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks to satisfy. The limitations of 5G networks have been apparent with the deployment of more and more 5G networks, which certainly encourages the investigation of 6G networks as the answer for the future. This research includes fundamental privacy and security issues related to 6G technology. Keeping an eye on real-time systems requires secure wireless sensor networks (WSNs). Denial of service (DoS) attacks mark a significant security vulnerability that WSNs face, and they can compromise the system as a whole. This research proposes a novel method in blockchain 6G-based wireless network security management and optimization using a machine learning model. In this research, the deployed 6G wireless sensor network security management is carried out using a blockchain user datagram transport protocol with reinforcement projection regression. Then, the network optimization is completed using artificial democratic cuckoo glowworm remora optimization. The simulation results have been based on various network parameters regarding throughput, energy efficiency, packet delivery ratio, end–end delay, and accuracy. In order to minimise network traffic, it also offers the capacity to determine the optimal node and path selection for data transmission. The proposed technique obtained 97% throughput, 95% energy efficiency, 96% accuracy, 50% end–end delay, and 94% packet delivery ratio. © 2024 by the authors.
引用
下载
收藏
相关论文
共 50 条
  • [21] Security In Wireless Body Area Network (WBAN) Using Blockchain
    Chandra, B.
    Raja, Kanaga Suba
    IETE JOURNAL OF RESEARCH, 2024, 70 (01) : 487 - 498
  • [22] DDoS mitigation using blockchain and machine learning techniques
    Jawahar, A.
    Kaythry, P.
    Kumar, Vinoth C.
    Vinu, R.
    Amrish, R.
    Bavapriyan, K.
    Gopinaath, V
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (21) : 60265 - 60278
  • [23] Machine Learning for Optical Network Security Management
    Furdek, Marija
    Natalino, Carlos
    2020 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC), 2020,
  • [24] Smart Healthcare Based on 6G Network Using Wireless Communication and Machine Learning Model in Cardiac Disease Analysis
    Manikandan, N.
    Qamar, Shamimul
    Priyadharshini, K.
    Sharma, Girish Kumar
    Uma, S.
    Tatini, Narendra Babu
    WIRELESS PERSONAL COMMUNICATIONS, 2024,
  • [25] Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture
    Xie, Hui
    Zheng, Jun
    Wei, Shengjun
    Hu, Changzhen
    COMPUTER COMMUNICATIONS, 2024, 217 : 259 - 267
  • [26] ArguteDUB: Deep Learning Based Distributed Uplink Beamforming in 6G-Based IoV
    Yi, Xingrui
    Li, Jianqiang
    Liu, Yutong
    Kong, Linghe
    Shao, Ying
    Chen, Guihai
    Liu, Xue
    Mumtaz, Shahid
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2551 - 2565
  • [27] Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network
    Khan, Adnan Shahid
    Yahya, Mohd Izzat Bin
    Zen, Kartinah B. T.
    Abdullah, Johari Bin
    Rashid, Rozeha Binti A.
    Javed, Yasir
    Khan, Nayeem Ahmad
    Mostafa, Ahmed M. M.
    IEEE ACCESS, 2023, 11 : 20524 - 20541
  • [28] Towards a lightweight security framework using blockchain and machine learning
    Ismail, Shereen
    Nouman, Muhammad
    Dawoud, Diana W.
    Reza, Hassan
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (01):
  • [29] Machine Learning for Large-Scale Optimization in 6G Wireless Networks
    Shi, Yandong
    Lian, Lixiang
    Shi, Yuanming
    Wang, Zixin
    Zhou, Yong
    Fu, Liqun
    Bai, Lin
    Zhang, Jun
    Zhang, Wei
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2088 - 2132
  • [30] An optimization-based machine learning technique for smart home security using 5G
    Sharma, Vidhu Kiran
    Mohapatra, Srikanta Kumar
    Shitharth, S.
    Yonbawi, Saud
    Yafoz, Ayman
    Alahmari, Sultan
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104