Design of a Blockchain Based Security Model For IPV6 Addressing Communication

Authors

  • Harshal Wankar Computer Science and Engineering St. Vincent Pallotti College of Engineering & Technology, Nagpur, India
  • Prof. R.C. Roychaudhary Assistant Professor

Keywords:

Blockchain, secret sharing, encryption, hashing, public key infrastructure

Abstract

Security plays a vital role in the design of any data & process intensive system, where in data must be communicated in such a manner that only the intended entities should be able to decode and understand it. In order to provide security, various protocols and security models have been developed by researchers, these include, encryption models, hashing models, public key infrastructure systems, Blockchain systems, secret sharing systems, etc. All these systems have their own nuances, advantages and limitations, which makes it difficult for system designers to select the most optimum security models for their designed application. For instance, security systems that are delay sensitive should be able to secure data at high speed with low complexity, but this property might reduce the system’s security performance. In order to reduce the ambiguity of security protocol selection, this report evaluates statistical performance of different security systems in terms of operating speed, security level, quality of service, and applicability. Blockchain based systems incorporate encryption, hashing, key sharing, and other security steps, thus these systems are primarily discussed in this work. Apart from Blockchain systems, security can also be improved via efficient data distribution using secret sharing mechanisms. Therefore, this report also evaluates security performance of secret sharing mechanisms and evaluates their performance on different applications. It is observed that combination of blockchain with secret sharing mechanisms paves the way for future security systems, that possess high QoS and high security performane.

References

Mohanta, Bhabendu & Jena, Debasish & Panda, Soumyashree & Sobhanayak,

Srichandan. (2019). Blockchain Technology: A Survey on Applications and Security Privacy Challenges. 8. 100107. 10.1016/j.IPv6.2019.100107.

Sarosh, Parsa & Parah, Shabir & Bhat, Gm. (2021). Utilization of secret sharing

technology for secure communication: a state-of-the-art review. Multimedia Tools and Applications. 80. 1-25. 10.1007/s11042-020-09723-7.

Ghasemi, R. Resolving a common vulnerability in secret sharing scheme–based data outsourcing schemes. Concurrency Computat Pract Exper. 2020; 32:e5363. https://doi.org/10.1002/cpe.5363

Gupta, M., Gupta, M. & Deshmukh, M. Single secret image sharing scheme using neural cryptography. Multimed Tools Appl 79, 12183–12204 (2020). https://doi.org/10.1007/s11042-019-08454-8

Abidi, MH, Alkhalefah, H, Umer, U, Mohammed, MK. Blockchain‐based secure information sharing for supply chain management: Optimization assisted data sanitization process. Int J Intell Syst. 2021; 36: 260‐ 290. https://doi.org/10.1002/int.22299

Gupta, R, Kumari, A, Tanwar, S. Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications. Trans Emerging Tel Tech. 2021; 32:e4176. https://doi.org/10.1002/ett.4176

Mostafa Yavari, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, Chien-Ming Chen, "An Improved Blockchain-Based Authentication Protocol for IPv6 Network Management", Security and Communication Networks, vol. 2020, Article ID 8836214, 16 pages, 2020. https://doi.org/10.1155/2020/8836214

Downloads

Published

30-06-2022

How to Cite

Harshal Wankar, & Prof. R.C. Roychaudhary. (2022). Design of a Blockchain Based Security Model For IPV6 Addressing Communication. International Journal for Research Publication and Seminar, 13(2), 223–228. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/594

Issue

Section

Original Research Article