A SURVEY OF THE BLOCKCHAIN CONCEPT AND MITIGATION CHALLENGES IN DIFFERENT NETWORKS

Wed Kadhim Oleiwi wsci.wed.kadhum@uobabylon.edu.iq
Alharith A.Abdullah alharith@itnet.uobabylon.edu.iq

Abstract

Blockchain is an important technology that is considered to be a hot research subject for its perfect performance in terms of distributed systems and security. Networks are the backbone of life today, and it is found in different aspects such as military, industry, health, scientific works, and monitoring. However, networks tend to suffer from a number of issues (such as threats and attacks) which cause them to fail and prevents them from performing properly. This work presents an introduction to the blockchain technology, followed by the explanation of its distinct features which help in dealing with the aforementioned network issues, enhancing the network performance, and eventually increasing its overall security.

Keywords:

Blockchain, Network, Wireless network, IOT network, Wireless Sensor Network (WSN), Ad-hoc network.


Full Text:

PDF


References


[1] Nakamoto, S., 2008. Bitcoin: A peer-to-peer electronic cash system [2] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An overview of blockchain technology: Architecture, consensus, and future trends," in 2017 IEEE International Congress on Big Data (BigData Congress), 2017, pp. 557-564. [3] S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," 2008. [4] X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, et al., "A taxonomy of blockchain-based systems for architecture design," in 2017 IEEE International Conference on Software Architecture (ICSA), 2017, pp. 243-252 [5] N. Andrade, M. Mowbray, A. Lima, G. Wagner, and M. Ripeanu, \Inuenceson cooperation in bittorrent communities," in Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems. ACM, 2005, pp.111{115. [6] G. Fox, \Peer-to-peer networks," Computing in Science & Engineering, vol. 3,no. 3, pp. 75{77, 2001. [7] S. Guha and N. Daswani, \An experimental study of the skype peer-to-peer voipsystem," Cornell University, Tech. Rep., 2005. Reviews, vol. 100, pp. 143-174, 2019. [8] W. Yang, S. Garg, A. Raza, D. Herbert, and B. Kang, "Blockchain: trends and future," in Pacific Rim Knowledge Acquisition Workshop, 2018, pp. 201-210. [9] H. F. Atlam and G. B. Wills, "Technical aspects of blockchain and IoT," Role of Blockchain Technology in IoT Applications, vol. 115, p. 1, 2019. [10] G. W. Peters and E. Panayi, "Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money," in Banking beyond banks and money, ed: Springer, 2016, pp. 239-278. [11]F. Alaba, M. Othman, I. Hashem and F. Alotaibi, “Internet of Things security: A survey”, Journal of Network and Computer Applications, 88, pp.10-28, 2017. [12] H. Kim and E. A. Lee, "Authentication and Authorization for the Internet of Things," in IT Professional, vol. 19, no. 5, pp. 27-33, 2017. doi: 10.1109/MITP.2017.3680960 [13] Jurcut, A., Coffey, T., Dojen, R. and Gyorodi, R., “Analysis of a key-establishment security protocol”, Journal of Computer Science and Control Systems, Vol. 2008, ISSN 1844-6043, pp. 42-47, 2008. [14] Jurcut, A.D., Liyanage, M., Chen J., Gyorodi C., He, J., “On the Security Verification of a Short Message Service Protocol”, 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, April 2018. DOI: 10.1109/WCNC.2018.8377349 [15] J. Deogirikar and A. Vidhate, "Security attacks in IoT: A survey," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 32-37, DOI: 10.1109/I-SMAC.2017.8058363 [16]K. Lee, D. Kim, D. Ha, U. Rajput and H. Oh, "On security and privacy issues of fog computing supported Internet of Things environment," 2015 6th International Conference on the Network of the Future (NOF), Montreal, QC, 2015, pp. 1-3, doi: 10.1109/NOF.2015.7333287. [17] I.F. Akyildiz, E.P. Stuntebeck, Wireless underground sensor networks: research challenges, Ad-Hoc Networks 4 (2006) 669–686. [18] M. Li, Y. Liu, Underground structure monitoring with wireless sensor networks, in: Proceedings of the IPSN, Cambridge, MA, 2007. [19] I.F. Akyildiz, D. Pompili, T. Melodia, Challenges for efficient communication in underwater acoustic sensor networks, ACM Sigbed Review 1 (2) (2004) 3– 8. [20 J. Heidemann, Y. Li, A. Syed, J. Wills, W. Ye, Underwater sensor networking: research challenges and potential applications, in: Proceedings of the Technical Report ISI-TR-2005-603, USC/ Information Sciences Institute, 2005. [21] I.F. Akyildiz, T. Melodia, K.R. Chowdhury, A survey on wireless multimedia sensor networks, Computer Networks Elsevier 51 (2007) 921–960. [22] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 2002 Wireless sensor networks: a survey, Computer Networks, vol 38, no. 4, pp. 393-422, (March 2002.) [23] Pirmez, L., Delicato, F., Pires, P., Mostardinha, A., de Rezende, N.:2007 Applyingfuzzy logic for decisionmaking on wireless sensor networks. In: Fuzzy Systems Conference '07, Proc., IEEE (2007). [24] J. Duato, “A necessary and sufficient condition for deadlock-free routing in cut-through and store-and-forward networks,” IEEE Trans Parallel and Distrib. Systems, vol. 7, no. 8, pp. 841-854, Aug. 1996. [25] Barakabitze, Alcardo & Ahmad, Arslan & Hines, Andrew & Mijumbi, Rashid. (2019). 5G Network Slicing using SDN and NFV: A Survey of Taxonomy, Architectures and Future Challenges. Computer Networks. 167. 106984. 10.1016/j.comnet.2019.106984. [26]Chuck Black and Paul Goransson . "Software Defined Networks: A Comprehensive Approach." (2014). [27] Yustus Eko Oktian, SangGon Lee, HoonJae Lee, JunHuy Lam, Distributed SDN controller system: A survey on design choice, Computer Networks, Volume 121, 2017, Pages 100-111, ISSN 1389-1286. [28] Zhang, G., Li, T., Li, Y. et al. Blockchain-Based Data Sharing System for AI-Powered Network Operations. J. Commun. Inf. Netw. 3, 1–8 (2018). https://doi.org/10.1007/s41650-018-0024-3 [29] Jiang, Xin & Liu, Mingzhe & Yang, Chen & Liu, Yanhua & Wang, Ruili. (2019). A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access. Computers, Materials & Continua. 58. 45-59. 10.32604/cmc.2019.03863. [30] Ren, Y., Leng, Y., Zhu, F., Wang, J., & Kim, H. J. (2019). Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network. Sensors (Basel, Switzerland), 19(10), 2395. https://doi.org/10.3390/s19102395 [31] D. B. Rawat and A. Alshaikhi, "Leveraging Distributed Blockchain-based Scheme for Wireless Network Virtualization with Security and QoS Constraints," 2018 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, 2018, pp. 332-336, doi: 10.1109/ICCNC.2018.8390344. [32]Lin, Di, and Yu Tang. "Blockchain consensus based user access strategies in D2D networks for data-intensive applications." IEEE Access 6 (2018): 72683-72690. [33]Ling, Xintong, et al. "Blockchain radio access network (B-RAN): Towards decentralized secure radio access paradigm." IEEE Access 7 (2019): 9714-9723. [34]Z. Liu, D. Wang, J. Wang, X. Wang and H. Li, "A Blockchain-Enabled Secure Power Trading Mechanism for Smart Grid Employing Wireless Networks," in IEEE Access, vol. 8, pp. 177745-177756, 2020, doi: 10.1109/ACCESS.2020.3027192. [35] Dorri, Ali, Salil S. Kanhere, and Raja Jurdak. "Towards an optimized blockchain for IoT." 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2017. [36] P. K. Sharma, S. Singh, Y. Jeong and J. H. Park, "DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks," in IEEE Communications Magazine, vol. 55, no. 9, pp. 78-85, Sept. 2017, doi: 10.1109/MCOM.2017.1700041 [37]Novo, Oscar. "Blockchain meets IoT: An architecture for scalable access management in IoT." IEEE Internet of Things Journal 5.2 (2018): 1184-1195. [38]A. Yazdinejad, R. M. Parizi, A. Dehghantanha, Q. Zhang and K. -K. R. Choo, "An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security," in IEEE Transactions on Services Computing, vol. 13, no. 4, pp . 625-638, 1 July-Aug. 2020, doi: 10.1109/TSC.2020.2966970. [39]Moinet, Axel, Benoît Darties, and Jean-Luc Baril. "Blockchain based trust & authentication for decentralized sensor networks." arXiv preprint arXiv:1706.01730 (2017). [40] Ren, Yongjun, et al. "Incentive mechanism of data storage based on blockchain for wireless sensor networks." Mobile Information Systems 2018 (2018). [41] She, Wei, et al. "Blockchain trust model for malicious node detection in wireless sensor networks." IEEE Access 7 (2019): 38947-38956. [42] Kim, Tai-Hoon, et al. "A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks." IEEE Access 7 (2019): 184133-184144. [43] Pieroni, Alessandra, et al. "Smarter city: smart energy grid based on blockchain technology." Int. J. Adv. Sci. Eng. Inf. Technol 8.1 (2018): 298-306. [44] Rathee, Geetanjali, et al. "A blockchain framework for securing connected and autonomous vehicles." Sensors 19.14 (2019): 3165. [45] X. Zhang and X. Chen, "Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network," in IEEE Access, vol. 7, pp. 58241-58254, 2019, doi: 10.1109/ACCESS.2018.2890736. [46] C. Lin, D. He, X. Huang, N. Kumar and K. R. Choo, "BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks," in IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2020.3002096. [47]S. Boukria, M. Guerroumi and I. Romdhani, "BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN," 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 2019, pp. 1034-1039, doi: 10.1109/ISCC47284.2019.8969780. [48] Yazdinejad, Abbas, et al. "Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks." IEEE Transactions on Network Science and Engineering (2019). [49] H. Yang, Y. Liang, Q. Yao, S. Guo, A. Yu, and J. Zhang, “Blockchain based secure distributed control for software defined optical networking,” China Communications, vol. 16, no. 6, pp. 42–54, 2019 [50] Jiasi, Weng & Jian, Weng & Jia-Nan, Liu & Zhang, Yue. (2019). Secure Software-Defined Networking Based on Blockchain

Refbacks

  • There are currently no refbacks.