| Literature DB >> 35684802 |
Tejal Rathod1, Nilesh Kumar Jadav1, Mohammad Dahman Alshehri2, Sudeep Tanwar1, Ravi Sharma3, Raluca-Andreea Felseghi4, Maria Simona Raboaca5.
Abstract
The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent transportation systems, smart homes, smart cities, industrial automation, etc. However, the WN is impeded by several security threats, such as data manipulation, denial-of-service, injection, man-in-the-middle, session hijacking attacks, etc., that deteriorate the security performance of the aforementioned WN-based intelligent services. Toward this goal, various security solutions, such as cryptography, artificial intelligence (AI), access control, authentication, etc., are proposed by the scientific community around the world; however, they do not have full potential in tackling the aforementioned security issues. Therefore, it necessitates a technology, i.e., a blockchain, that offers decentralization, immutability, transparency, and security to protect the WN from security threats. Motivated by these facts, this paper presents a WNs survey in the context of security and privacy issues with blockchain-based solutions. First, we analyzed the existing research works and highlighted security requirements, security issues in a different generation of WN (4G, 5G, and 6G), and a comparative analysis of existing security solutions. Then, we showcased the influence of blockchain technology and prepared an exhaustive taxonomy for blockchain-enabled security solutions in WN. Further, we also proposed a blockchain and a 6G-based WN architecture to highlight the importance of blockchain technology in WN. Moreover, the proposed architecture is evaluated against different performance metrics, such as scalability, packet loss ratio, and latency. Finally, we discuss various open issues and research challenges for blockchain-based WNs solutions.Entities:
Keywords: blockchain; distributed ledger technology; privacy; security; wireless networks
Mesh:
Year: 2022 PMID: 35684802 PMCID: PMC9185230 DOI: 10.3390/s22114182
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Evolution of wireless networks.
Figure 2Organization of the paper.
Figure 3Design factors of wireless networks security.
Figure 4A workflow of the blockchain process.
Figure 5Blockchain features.
Figure 6Hierarchy of blockchain.
A comparative analysis of the existing survey with the proposed study on the blockchain-based solutions for the security and privacy issues in WNs.
| Year | Author | Contribution | Observations | Remarks |
|---|---|---|---|---|
| 2016 | Zou et al. [ | Discussed security attacks, protocols, and algorithms in WNs for physical layer | Discussion about security and privacy in other layers have lacked | Cover security and privacy in every layer |
| 2017 | Boudguiga et al. [ | Discussed blockchain infrastructure for IoT | Analyzed confidentiality, integrity and availability with different use case | Did not discuss the vulnerability in the security |
| 2018 | Ferrag et al. [ | Analyzed existing privacy-preserving and authentication schemes for 4G and 5G | Did not discuss layer-wise security in WNs | Study on layer-wise security for different generation networks is required |
| 2019 | Pohrmen et al. [ | Explored IoT-based system with Blockchain for SDN platforms | Application of blockchain in subsystem is lacking | Blockchain usage in smart applications, such as smart city, autonomous vehicle, identity management, etc., that need emphasis |
| 2019 | Casino et al. [ | Review of blockchain-based applications through multiple domains, established trends, key themes, and emerging areas | Security requirement in different application domain has not been covered | Analyzed security requirements using blockchain with scalability, privacy, interoperability, audit, latency, and visibility issues |
| 2019 | Rouhani et al. [ | Reviewed existing approaches and security tools for performance enhancement of decentralized applications based on smart contract | Did not discuss problems and limitations of smart contract in individual applications | A comparison of blockchain-based solutions with other existing solutions is required |
| 2019 | Wang et al. [ | A Blockchain scheme for IoT | Comparison of existing security techniques with blockchain techniques is missing | Should provide a comparative analysis of existing techniques with blockchain-based approaches |
| 2019 | Aggarwal et al. [ | Surveyed Blockchain for smart communities and analyzed process models for secure transactions | Comparison of Blockchain with existing security solutions is lacked | Survey on blockchain-based security and privacy challenges needs to be highlighted |
| 2019 | Hussien et al. [ | Studied blockchain in healthcare domain with various features such as data integrity, access control, etc. | Comparison of consensus mechanism of blockchain is not included | Should emphasize application of blockchain for security and privacy perspective |
| 2020 | Liu et al. [ | A blockchain-based identity management solutions | Highlighted conceptual analysis for identity management solutions | Real-time applicability of blockchain-based solution need to be taken into consideration |
| 2020 | Xie et al. [ | Discussed blockchain for cloud data exchange based on transaction management, and reputation systems | Analysis of existing security methods with blockchain for cloud is lacking | Existing blockchain-based solutions for cloud data exchange need to be discussed in detail |
| 2020 | Tahir et al. [ | Discussed blockchain in 5G and future WNs | Did not cover comparison of blockchain with another approaches of security and privacy | Cover existing security and privacy solutions based on blockchain |
| 2021 | Wazid et al. [ | Examined the existing research in the field of 5G-enabled IoT communication environment and provided system model, security protocol, and attacks | Did not cover the detail about layer-wise security in WNs | Layer-wise security in WNs should be considered |
| 2021 | Hewa et al. [ | Explored the applications for the blockchain-based smart contracts | Application of smart contract in security and privacy perspective is lacking | Should cover existing method and compare with smart contract-based with application |
| 2022 | Saraswat et al. [ | Presented blockchain enabled federated learning in UAVs for trusted exchange of information | Discussed UAV security with blockchain and proposed case study | Security attacks for blockchain enabled UAV need to be highlighted |
| 2022 | Abualsauod et al. [ | Studied blockchain and ML techniques for the security in UAVs | Analyzed the hybrid blockchain model for security and reliability and presented future direction | Real-time applicability needs to be discussed with case study |
| 2022 | Grover et al. [ | Studied security of ITS in VANET | Discussed existing solution based on blockchain for VANET security | Did not consider layer-wise security attacks |
| 2022 | Pattewar et al. [ | Analyzed existing solution for IoT security using blockchain | Discussed consensus algorithms for security and privacy in various use case | Did not specify the security vulnerability and attacks |
| 2022 | Wang et al. [ | Studied security and privacy issues in metaverse | Analyzed security threat and blockchain based security solutions | Did not consider possibility of the security attacks |
| 2022 | The proposed approach | Analyzed security requirements and issues based on different layer, proposed taxonomy for existing security and privacy approaches envisioned security attacks and their countermeasures | Proposed a blockchain-based WNs architecture for security and privacy perspective with the scalability and latency comparison | - |
Figure 7The proposed taxonomy for blockchain-enabled wireless networks.
Countermeasures for passive security attacks in different layers of WNs.
| Layer | Attacks | Countermeasures | Ref |
|---|---|---|---|
| Physical layer | Eavesdropping attack |
Limiting resources by network segmentation Avoid untrusted links Blocking unintended radiation in a computer using shielding | [ |
| Jamming |
Anti-jamming systems Cryptographic Steganography | [ | |
| Device tampering |
Firewalls Encryption technique-Hash based message authentication code (HMAC) Access restriction File integrity monitoring | [ | |
| MAC layer | MAC Spoofing |
Encrypted protocols Alert-enabled traffic monitoring Reverse address resolution protocol | [ |
| MiTM attack |
Public-key authentication Strong WEP/WAP encryption on AP Use of a virtual private network (VPN) and Wi-Fi networks | [ | |
| Network layer | Wormhole attack |
Packet leashes Separate route algorithm | [ |
| Blackhole attack |
Redundant route method Time-based baited approach | [ | |
| DoS attacks |
Limiting broadcasting Protecting endpoints Rejecting fake traffic using firewalls and routers | [ | |
| Transport layer | Flooding attacks |
Configuring the firewall Installing an intrusion prevention system (IPS) that identify network traffic patterns | [ |
| Session Hijack |
Encrypt session id User authentications Secure cookies Ciphering the packets IPSec, and SSL approaches | [ | |
| Application layer | SMTP attack |
SSL and TLS Inserting a security layer into the SMTP server prevent this attack | [ |
| SQL injection |
Make more than one database user account Web applications firewall Limit privileges Adding input validation prevents SQL injection | [ |
Blockchain-based solution for different smart applications in security and privacy perspectives of WNs.
| Year | Author | Applications | Security Issues | Approach | Pros | Cons |
|---|---|---|---|---|---|---|
| 2020 | Cao et al. [ | Wireless industrial IoT (IIoTs) | Scarcity of spectrum resources | Presented blockchain-based on CDMA/CA model | Introduced stochastic mode and double-spending attack on CDMA/CA | Not considered layer wise security |
| 2020 | Xu et al. [ | IoT applications | Malicious jamming | Presented RAFT based blockchain network | Proposed consensus algorithm | Not considered multi-jammer problem |
| 2020 | Khan et al. [ | 5G security for different technology like SDN, NFV etc | Detection and prevention of sabotage | Proposed 5G security model | Considered network and physical layer security | Other layer security is lacked |
| 2020 | Bouras et al. [ | e-healthcare | Data tampering | Analyzed eHealth scenario using blockchain | Presented identity model with blockchain | Did not consider real-time scenario results |
| 2021 | Han et al. [ | Unmanned aerial vehicles | Reliability and connectivity, energy efficiency, data privacy | Blockchain-based approach | Proposed drone-based architecture on 5G for with different technologies | Did not discuss security attacks |
| 2021 | Sun et al. [ | Edge cache network | Data tempering and eavesdropper | Blockchain-based 6G framework | Used 6G edge caching and two-hop transmission, optimize the cashing for secure transaction | Did not incorporate a comparative analysis of the proposed approach with existing security solutions |
| 2021 | Rahman et al. [ | Resource management for IoT | Energy efficiency and end-to-end delay for resource utilization | Blockchain-based SDN framework | Proposed cluster-head selection algorithm to secure network | Did not consider mobility |
| 2021 | Wu et al. [ | Drone Communication | Drone ID management, privacy and trajectory protection | Presented blockchain-enabled trajectory privacy protection scheme | Used in military and civilian area | Did not cover security attacks |
| 2021 | Wu et al. [ | Healthcare | Private information protection of medical system | Elliptic curve Diffie–Hellman key exchange approach and file authorization contracts | Enhanced reliability and bandwidth utilization of data transmission | Did not discuss security attacks on the existing approach |
| 2022 | Jayabalan et al. [ | Healthcare | Monetary and resource loss | Temper register blockchain bad framework with IPFS storage for the healthcare | They used symmetric and asymmetric key encryption, digital signature and hashing algorithm and IPFS to deal with scalability issue | Did not discuss security and privacy attacks in the system |
| 2022 | Fatima et al. [ | Healthcare | Data tampering | Blockchain-based cloud technology for healthcare | They presented state of the art on blockchain enabled healthcare system | Did not consider security issues of the existing solution |
| 2022 | Perez et al. [ | Crowd-sensing systems | Data confidentiality, integrity, and system availability | Proposed crowd-sensing systems using smart contracts and blockchain | They discussed security and privacy issue with blockchain based solution in crowd-sensing systems | Did not discuss security and privacy problem to add blockchain and smart contract in the system |
| 2022 | Qahtan et al. [ | IoT healthcare Industry 4.0 systems | User authentication, access control, and privacy protection | Analyzed MCDM problem in blockchain enabled IoT healthcare Industry 4.0 systems | Proposed spherical FWZIC for security and privacy, GRA-TOPSIS, and BES approach for optimization | Did not discuss security and privacy attacks and their countermeasures in the presented approach |
Figure 8The proposed architecture: enabling blockchain technology for wireless networks.
Simulation parameters of the proposed architecture.
| Parameters | Values |
|---|---|
| Wireless network layer parameters | |
| Frequency range | 95 GHz |
| Channel bandwidth | 130 MHz |
| Subcarrier spacing | 60 KHz |
| Modultation | OFDM |
| Channel coding | Polar coding |
| Fading channel | comm.RayleighChannel |
| Blockchain layer parameters | |
| Solidity compiler | 0.8.10+commit.fc410830 |
| Remix environment | Injected Web3 |
| Gas limit | 3,000,000 |
Figure 9Result analysis of the proposed architecture. (a) Scalability comparison. (b) Latency comparison. (c) Packet-loss ratio comparison.
Figure 10Open issues and research challenges.