Design of a Blockchain Based Security Model For IPV6 Addressing Communication
Keywords:
Blockchain, secret sharing, encryption, hashing, public key infrastructureAbstract
Security plays a vital role in the design of any data & process intensive system, where in data must be communicated in such a manner that only the intended entities should be able to decode and understand it. In order to provide security, various protocols and security models have been developed by researchers, these include, encryption models, hashing models, public key infrastructure systems, Blockchain systems, secret sharing systems, etc. All these systems have their own nuances, advantages and limitations, which makes it difficult for system designers to select the most optimum security models for their designed application. For instance, security systems that are delay sensitive should be able to secure data at high speed with low complexity, but this property might reduce the system’s security performance. In order to reduce the ambiguity of security protocol selection, this report evaluates statistical performance of different security systems in terms of operating speed, security level, quality of service, and applicability. Blockchain based systems incorporate encryption, hashing, key sharing, and other security steps, thus these systems are primarily discussed in this work. Apart from Blockchain systems, security can also be improved via efficient data distribution using secret sharing mechanisms. Therefore, this report also evaluates security performance of secret sharing mechanisms and evaluates their performance on different applications. It is observed that combination of blockchain with secret sharing mechanisms paves the way for future security systems, that possess high QoS and high security performane.
References
Mohanta, Bhabendu & Jena, Debasish & Panda, Soumyashree & Sobhanayak,
Srichandan. (2019). Blockchain Technology: A Survey on Applications and Security Privacy Challenges. 8. 100107. 10.1016/j.IPv6.2019.100107.
Sarosh, Parsa & Parah, Shabir & Bhat, Gm. (2021). Utilization of secret sharing
technology for secure communication: a state-of-the-art review. Multimedia Tools and Applications. 80. 1-25. 10.1007/s11042-020-09723-7.
Ghasemi, R. Resolving a common vulnerability in secret sharing scheme–based data outsourcing schemes. Concurrency Computat Pract Exper. 2020; 32:e5363. https://doi.org/10.1002/cpe.5363
Gupta, M., Gupta, M. & Deshmukh, M. Single secret image sharing scheme using neural cryptography. Multimed Tools Appl 79, 12183–12204 (2020). https://doi.org/10.1007/s11042-019-08454-8
Abidi, MH, Alkhalefah, H, Umer, U, Mohammed, MK. Blockchain‐based secure information sharing for supply chain management: Optimization assisted data sanitization process. Int J Intell Syst. 2021; 36: 260‐ 290. https://doi.org/10.1002/int.22299
Gupta, R, Kumari, A, Tanwar, S. Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications. Trans Emerging Tel Tech. 2021; 32:e4176. https://doi.org/10.1002/ett.4176
Mostafa Yavari, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, Chien-Ming Chen, "An Improved Blockchain-Based Authentication Protocol for IPv6 Network Management", Security and Communication Networks, vol. 2020, Article ID 8836214, 16 pages, 2020. https://doi.org/10.1155/2020/8836214
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.