학술논문

The Design and implementation of a double layered Security Network with an Authentication System through Block chain Technology
Document Type
Conference
Source
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) Advance Computing and Innovative Technologies in Engineering (ICACITE), 2023 3rd International Conference on. :1469-1474 May, 2023
Subject
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Cellular networks
Distributed ledger
Simulation
Authentication
Computer architecture
Telecommunication traffic
Blockchains
IOT
Blockchain
Network Security
Authorization
Language
Abstract
With more and more connected devices joining IoT networks, protecting their communications is becoming more difficult. The distributed ledger technology known as blockchain has the potential to solve the security issues plaguing 5G-enabled IoT networks. This article provides a layered blockchain security strategy to protect Internet of Things networks and make their deployment simpler. Using clustering, the complex multi-layer structure is simplified. The K-unknown clusters in the IoT network are generated by use of a hybrid Evolutionary Computation Methodology involving Simulated Annealing and Genetic Algorithms. The chosen cluster chiefs have authority over local authentication and permissions. By creating a private blockchain network on a local level, cluster administrators and critical nodes can streamline their interactions. This type of blockchain also facilitates authentication on a network, but it also adds an extra layer of security and integrity. The proposed framework makes use of Hyperledger Fabric, an open-source implementation of Distributed ledger technology. The encryption of data transmitted between nodes is ensured by the use of a global distributed ledger technology, which is instated in the base stations. As opposed to previously disclosed methods, simulation results show that the proposed clustering algorithm is effective. Finally, it is shown that the envisaged portable cryptocurrency architecture achieves a better latency/capacity tradeoff than a conventional global blockchain.