QOS AND DEFENSE ENHANCEMENT USING BLOCK CHAIN FOR FLY WIRELESS NETWORKS
PDF

Keywords

Fly networks
Block chain
Trust management
Vulnerabilities
Quality of service
Defense enhancement

How to Cite

Bhalaji, N. 2019. “QOS AND DEFENSE ENHANCEMENT USING BLOCK CHAIN FOR FLY WIRELESS NETWORKS”. Journal of Trends in Computer Science and Smart Technology 1 (1): 1-13. https://doi.org/10.36548/jtcsst.2019.1.001.

Abstract

The autonomous mobile nodes framing an instantaneous network, utilizing the nearby available device that volunteer in establishing network is coined as the fly wire network. These adhoc type of network framed simultaneously are prone to various vulnerabilities, developing alterations in the information's or hacking of information's or the blocking of services. These security threats causing losses in the information transmitted, makes it necessary for the trust evaluation of the nodes to identify the selfish nodes. So the paper proposes the block chain trust management of nodes to avoid the vulnerabilities in the transmission path, enhancing the performance of the network. The performance of the proposed method is validated in the network simulator -II to ensure its capability in terms of the quality of service and the security (defense).

PDF

References

Meng, Weizhi, Elmar Wolfgang Tischhauser, Qingju Wang, Yu Wang, and Jinguang Han. "When intrusion detection meets blockchain technology: a review." Ieee Access 6 (2018): 10179-10188.

Valdeolmillos, Diego, Yeray Mezquita, Alfonso González-Briones, Javier Prieto, and Juan Manuel Corchado. "Blockchain Technology: A Review of the Current Challenges of Cryptocurrency." In International Congress on Blockchain and Applications, pp. 153-160. Springer, Cham, 2019.

Kumar, Gulshan, Rahul Saha, Mritunjay Kumar Rai, Reji Thomas, and Tai-Hoon Kim. "Proof-of-Work consensus approach in Blockchain Technology for Cloud and Fog Computing using Maximization-Factorization Statistics." IEEE Internet of Things Journal (2019).

Hawlitschek, Florian, Benedikt Notheisen, and Timm Teubner. "The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy." Electronic commerce research and applications 29 (2018): 50-63.

Yaga, Dylan, Peter Mell, Nik Roby, and Karen Scarfone. "Blockchain technology overview." arXiv preprint arXiv:1906.11078 (2019).

Arslanian, Henri, and Fabrice Fischer. "Blockchain As an Enabling Technology." In The Future of Finance, pp. 113-121. Palgrave Macmillan, Cham, 2019.

Mohsin, A. H., A. A. Zaidan, B. B. Zaidan, O. S. Albahri, A. S. Albahri, M. A. Alsalem, and K. I. Mohammed. "Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions." Computer Standards & Interfaces (2018).

Liu, Yiliang, Hsiao-Hwa Chen, and Liangmin Wang. "Physical layer security for next generation wireless networks: Theories, technologies, and challenges." IEEE Communications Surveys & Tutorials 19, no. 1 (2016): 347-376.

Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. "Physical layer security issues in interference-alignment-based wireless networks." IEEE Communications Magazine 54, no. 8 (2016): 162-168.

Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.

Gudipati, Aditya, Daniel Perry, Li Erran Li, and Sachin Katti. "SoftRAN: Software defined radio access network." In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp. 25-30. ACM, 2013.

Sarika, S., A. Pravin, A. Vijayakumar, and K. Selvamani. "Security issues in mobile ad hoc networks." Procedia Computer Science 92 (2016): 329-335.

Das, Sanjoy, Subrata Sahana, and Indrani Das. "Energy Efficient Area Coverage Mechanisms for Mobile Ad Hoc Networks." Wireless Personal Communications (2019): 1-14.

Kumar, A. Vinodh, and S. Kaja Mohideen. "Security aware routing protocol for hybrid wireless network (SARP-HWNs) via trust enhanced mechanism." International Journal of Business Data Communications and Networking (IJBDCN) 15, no. 1 (2019): 34-57.

Balaji, N. Alangudi, R. Sukumar, and M. Parvathy. "Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network." Computers & Electrical Engineering 76 (2019): 94-110.

Saudi, Nur Amirah Mohd, Mohamad Asrol Arshad, Alya Geogiana Buja, Ahmad Firdaus Ahmad Fadzil, and Raihana Md Saidi. "Mobile Ad-Hoc Network (MANET) Routing Protocols: A Performance Assessment." In Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017), pp. 53-59. Springer, Singapore, 2019.

Arumugham, Kowshika, and Vivekanandan Chenniappan. "Least Mobility High Power (LMHP) Dynamic Routing for QoS Development in Manet." Wireless Personal Communications105, no. 1 (2019): 355-368.

Kumari, Priyanka, and Sudip Kumar Sahana. "An Efficient Swarm-Based Multicast Routing Technique." In Computational Intelligence in Data Mining, pp. 123-134. Springer, Singapore, 2019.

Sharma, Anju, and Madhavi Sinha. "A differential evolution-based routing algorithm for multi-path environment in mobile ad hoc network." International Journal of Hybrid Intelligence 1, no. 1 (2019): 23-40.

Joshua, Christy Jackson, and Vijayakumar Varadarajan. "An optimization framework for routing protocols in VANETs: a multi-objective firefly algorithm approach." Wireless Networks (2019): 1-10.

Kochovski, Petar, Sandi Gec, Vlado Stankovski, Marko Bajec, and Pavel D. Drobintsev. "Trust management in a blockchain based fog computing platform with trustless smart oracles." Future Generation Computer Systems 101 (2019): 747-759.

Tschorsch, Florian, and Björn Scheuermann. "Bitcoin and beyond: A technical survey on decentralized digital currencies." IEEE Communications Surveys & Tutorials 18, no. 3 (2016): 2084-2123.