학술논문
The Design and implementation of a double layered Security Network with an Authentication System through Block chain Technology
Document Type
Conference
Author
Source
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) Advance Computing and Innovative Technologies in Engineering (ICACITE), 2023 3rd International Conference on. :1469-1474 May, 2023
Subject
Language
Abstract
With more and more connected devices joining IoT networks, protecting their communications is becoming more difficult. The distributed ledger technology known as blockchain has the potential to solve the security issues plaguing 5G-enabled IoT networks. This article provides a layered blockchain security strategy to protect Internet of Things networks and make their deployment simpler. Using clustering, the complex multi-layer structure is simplified. The K-unknown clusters in the IoT network are generated by use of a hybrid Evolutionary Computation Methodology involving Simulated Annealing and Genetic Algorithms. The chosen cluster chiefs have authority over local authentication and permissions. By creating a private blockchain network on a local level, cluster administrators and critical nodes can streamline their interactions. This type of blockchain also facilitates authentication on a network, but it also adds an extra layer of security and integrity. The proposed framework makes use of Hyperledger Fabric, an open-source implementation of Distributed ledger technology. The encryption of data transmitted between nodes is ensured by the use of a global distributed ledger technology, which is instated in the base stations. As opposed to previously disclosed methods, simulation results show that the proposed clustering algorithm is effective. Finally, it is shown that the envisaged portable cryptocurrency architecture achieves a better latency/capacity tradeoff than a conventional global blockchain.