Blockchain based secure data handover scheme in non-orthogonal multiple access (original) (raw)

Secure Modern Wireless Communication Network Based on Blockchain Technology

Electronics

Sixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple heterogeneity applications and facilities may be supported by modern wireless communication networks (MWCNs) with improved effectiveness and protection. Nevertheless, a variety of trust-related problems that are commonly disregarded in network architectures prevent us from achieving this objective. In the current world, MWCN transmits a lot of sensitive information. It is essential to protect MWCN users from harmful attacks and offer them a secure transmission to meet their requirements. A malicious node causes a major attack on reliable data during transmission. Blockchain offers a potential answer for confidentiality and safety as an innovative transformative tool that has emerged in the last few years. Blockchain has been extensively investigated in several domains, including mobile networks and the Internet of Things...

Blockchain-enabled FD-NOMA based Vehicular Network with Physical Layer Security

2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring)

Vehicular networks are vulnerable to large scale attacks. Blockchain, implemented upon application layer, is recommended as one of the effective security and privacy solutions for vehicular networks. However, due to an increasing complexity of connected nodes, heterogeneous environment and rising threats, a robust security solution across multiple layers is required. Motivated by the Physical Layer Security (PLS) which utilizes physical layer characteristics such as channel fading to ensure reliable and confidential transmission, in this paper we analyze the impact of PLS on a blockchain-enabled vehicular network with two types of physical layer attacks, i.e., jamming and eavesdropping. Throughout the analysis, a Full Duplex Non-Orthogonal Multiple Access (FD-NOMA) based vehicle-to-everything (V2X) is considered to reduce interference caused by jamming and meet 5G communication requirements. Simulation results show enhanced goodput of a blockckchain enabled vehicular network integrated with PLS as compared to the same solution without PLS.

Blockchain Radio Access Network (B-RAN): Towards Decentralized Secure Radio Access Paradigm

IEEE Access

The relentless growth of wireless applications and data traffic continues to accentuate the long felt need for decentralized, self-managed, and cooperative network architectures. Enlightened by the power of blockchain technology, we propose a blockchain radio access network (B-RAN) architecture and develop decentralized, secure, and efficient mechanisms to manage network access and authentication among inherently trustless network entities. We further identify promising advanced functions made possible by adopting blockchain for open radio access networks. Our test results demonstrate the benefits of the BRAN architecture. We also present a number of challenges and future research directions.

An Advanced Non-Orthogonal Multiple Access Security Technique for Future Wireless Communication Networks

RS Open Journal on Innovative Communication Technologies, 2020

The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. The conventional NOMA was previously adopted under the name of multiuser superposition transmission (MUST) in release 13 of 3GPP but recently excluded from 3GPP-release 17 due to its performance degradation. In this work, we analyze the drawbacks in conventional NOMA and present a new kind of NOMA with more improved performance metrics. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and secure communication without complex processing at the receivers in downlink scenarios. The effectiveness of the proposed algorithm is verified and proven by extensive analysis and numerical simulations.

An Advanced NOMA Security Technique for Future Wireless Communication Networks

Workshop on Information and Communications technologies, International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 17-19 Sep., 2020

The future wireless communication systems demand enhanced security and reliability than the current systems. In this work, we propose a more simple yet efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) system. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. As conventional NOMA was already adopted under the name of multi-user superposition transmission (MUST) in release 13 of 3GPP and is improved in terms of receiver design for 3GPP-release 16, which still suffers from several security risks and drawbacks. In this work, we have analyzed these drawbacks and presented a new kind of NOMA with better performance results in cases where conventional NOMA fails. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and secure communication without complex processing at the receivers in downlink scenarios. The effectiveness of the proposed algorithm is verified and proven by extensive numerical simulations.

XML Transmitted Data Security in Non-Orthogonal Multiple Access Networks with Directional Modulation Based on User Location

International Journal of Information and Communication Technology Research , 2023

In Non-orthogonal multiple access, a user with a weaker channel gain is assigned more power than a user with a stronger channel. This type of power allocation allows the strong user (SU) to apply the successive interference cancellation (SIC) method that first detects the symbols of the weak user (WU) before detecting its data. The SIC method makes the WU data vulnerable to eavesdropping at the SU and so increases the detection complexity. This paper studies the physical layer security of the data against eavesdropping. The proposed scheme uses directional modulation that distorts the symbols transmitted in an undesired direction therefore the external eavesdroppers receive different symbols. It becomes complicated for an external eavesdropper to track and detect the signal of legitimate users. This scheme eliminates the WU data on the location of the SU so the strong user does not need the SIC. We analyze the impacts of various factors on security, such as the number of antennas and the secrecy rate.

Empowering secure transmission for downlink of multiple access system relying non-orthogonal signal multiplexing

Bulletin of Electrical Engineering and Informatics, 2022

The growth of internet-of-things (IoT) inspired use cases in different run of the mill environments such as cities, industries, healthcare, agriculture, and transportation, has led to a greater desire for safer IoT data gathering and storage. However, securing IoT is challenging due to form-factor, complexity, energy, and connectivity limitations. Conventional coding-based security techniques are unsuitable for ultra-reliable low-latency and energy-efficient communication in IoT. Numerous research studies on physical layer security (PLS) techniques for fifth generation (5G) have emerged recently, but not all of the solutions can be used in IoT networks due to complexity limitations. Non-orthogonal multiple access (NOMA) is billed as a possible technology to solve connectivity and latency requirements in IoT. In this study, we exploit the power allocation characteristics of NOMA to enhance security in a downlink deviceto-device (D2D) decode and forward (DF) IoT network infiltrated by an eavesdropper. Our performance metric of choice is the secrecy outage probability (SOP). We formulate exact SOP results for different users. Simulation results demonstrate the positive impact of NOMA on SOP in a D2D IoT-NOMA network.

A Proposal on How to Use Blockchain to Secure Communications in 5G Ecosystem

International Journal of Future Computer and Communication

5G provides businesses with high-speed Internet access, faster bandwidth, and low latency. The use of IoT and 5G-enabled sensors provides new opportunities within networks. There are several use cases of 5G with IoT health care, agriculture, remote learning, logistics, manufacturing, government, and retail. However, some security and privacy problems must be addressed within the 5G ecosystem. There is a need to secure user and device associations and data integrity as 5G is becoming more and more popular. In this research-in-progress, we seek to solve security and privacy problems in 5G by applying Blockchain technology to secure 5G connections. The research will consist of an interdisciplinary team of researchers from Illinois State University (ISU) and non-academic-industry partners. During the study, we build a prototype that solves problems in agriculture and healthcare. A private 5G network is installed at ISU. Moisture sensors and IoT devices are installed at the university fa...

Secure OFDM-Based NOMA for Machine-to-Machine Communication

Wireless Communications and Mobile Computing, 2021

Machine-to-machine communication (M2M) has obtained increasing interest in recent years. However, its enhancement and broadcasting characteristics produced a new security challenge. We have suggested a novel dynamic Quadrature Amplitude Modulation (QAM) scheme for a totally elastic and dynamic mapping of user data by using chaos. This paper analyses physical layer security methods in Orthogonal Frequency Division Multiplexing-based Nonorthogonal Multiple Access (OFDM-NOMA) and introduces a secure data transmission mechanism created by dynamic QAM. The security robustness given by the suggested encryption scheme is assessed, where an overall keyspace of ~ 10 163 is achieved, which is sufficient to provide security against exhaustive attacks. The result of the scheme is verified through MATLAB simulation, where the bit error rate performance of our proposed scheme is compared with an unencrypted OFDM signal, and the performance of our proposed scheme is analyzed for an illegal user. T...

Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network

IEEE Access

Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultradense cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive services. Cell-Free gained researchers' interest as it offers ubiquitous communication with large bandwidth, high throughput, high data transmission, and greater signal gain. Cell-Free eliminates the idea of cell boundary in cellular communication that reduces frequent handover and inter-cell interference issues. However, the effectiveness of the current authentication protocol could become a serious issue due to the dynamic nature of Cell-Free in densely distributed, high number of users, high mobility, and frequent data exchange. Secondly, secure communication may be achieved in such a dynamic environment at the expense of high authentication overhead, high communication and computational costs. To address the above security challenges, we proposed a lightweight multifactor mutual authentication protocol for Cell-Free communication using ECC-based Deffie Hellman (ECDH). This scheme utilizes timestamping, one-way hash function, BlindFold Challenge scheme with public key infrastructure. The proposed cryptosystem integrates with blockchain technology using proof of staked (POS) as a consensus mechanism to ensure integrity, nonrepudiation and traceability. The proposed scheme can enforce the mitigation of several major security attacks on communication links such as spoofing attacks, eavesdropping, user location privacy issues, replay attacks, denial of service attacks, and man-in-the-middle (MITM) attacks, which is one of the significant features of the scheme. Furthermore, this scheme contributes to reducing authentication, communication, and computational overheads with an average of 32.8%, 52.4% and 53.2% better performance respectively as compared baseline authentication protocols.