scholarly journals A VERSATILE SECURITY FRAMEWORK USING BLOCKCHAIN TECHNOLOGY FOR FIFTH GENERATION COMMUNICATION NETWORKS

2021 ◽  
Vol 9 (1) ◽  
pp. 1099-1109
Author(s):  
Sakthibalan P., Devarajan K.

The fifth-generation (5G) network assimilates terahertz bandwidth and machine type communication (MTC) for swift and reliable data transfer and information exchange. It incorporates sophisticated cloud, Internet of Things (IoT), and other software-defined architectures for providing scalable service support. However, due to the heterogeneous integration of devices and architectures, secure infrastructures needto become mandatory. In this article, a Blockchain-based Versatile Security Framework (BVSF) is introduced to provide robust and adaptable authentication and access control in the 5G environment. The proposed framework allocates blocks for user equipment (UE) authentication and resource access control in a parallel manner. The verification of security level between resources, infrastructures, and UEs aids in extending or attenuating blockchain services. Based on the different security level assessments, the UE requests are precisely mapped or reallocated to the resources, improving the response rate and the framework adaptability.

Author(s):  
Alberto De la Rosa Algarín ◽  
Steven A. Demurjian ◽  
Timoteus B. Ziminski ◽  
Yaira K. Rivera Sánchez ◽  
Robert Kuykendall

Today’s applications are often constructed by bringing together functionality from multiple systems that utilize varied technologies (e.g. application programming interfaces, Web services, cloud computing, data mining) and alternative standards (e.g. XML, RDF, OWL, JSON, etc.) for communication. Most such applications achieve interoperability via the eXtensible Markup Language (XML), the de facto document standard for information exchange in domains such as library repositories, collaborative software development, health informatics, etc. The use of a common data format facilitates exchange and interoperability across heterogeneous systems, but challenges in the aspect of security arise (e.g. sharing policies, ownership, permissions, etc.). In such situations, one key security challenge is to integrate the local security (existing systems) into a global solution for the application being constructed and deployed. In this chapter, the authors present a Role-Based Access Control (RBAC) security framework for XML, which utilizes extensions to the Unified Modeling Language (UML) to generate eXtensible Access Control Markup Language (XACML) policies that target XML schemas and instances for any application, and provides both the separation and reconciliation of local and global security policies across systems. To demonstrate the framework, they provide a case study in health care, using the XML standards Health Level Seven’s (HL7) Clinical Document Architecture (CDA) and the Continuity of Care Record (CCR). These standards are utilized for the transportation of private and identifiable information between stakeholders (e.g. a hospital with an electronic health record, a clinic’s electronic health record, a pharmacy system, etc.), requiring not only a high level of security but also compliance to legal entities. For this reason, it is not only necessary to secure private information, but for its application to be flexible enough so that updating security policies that affect millions of documents does not incur a large monetary or computational cost; such privacy could similarly involve large banks and credit card companies that have similar information to protect to deter identity theft. The authors demonstrate the security framework with two in-house developed applications: a mobile medication management application and a medication reconciliation application. They also detail future trends that present even more challenges in providing security at global and local levels for platforms such as Microsoft HealthVault, Harvard SMART, Open mHealth, and open electronic health record systems. These platforms utilize XML, equivalent information exchange document standards (e.g., JSON), or semantically augmented structures (e.g., RDF and OWL). Even though the primary use of these platforms is in healthcare, they present a clear picture of how diverse the information exchange process can be. As a result, they represent challenges that are domain independent, thus becoming concrete examples of future trends and issues that require a robust approach towards security.


Telecom IT ◽  
2020 ◽  
Vol 8 (2) ◽  
Author(s):  
A. Volkov ◽  
A. Muthanna ◽  
A. Koucheryavy

In 2030 networks, it is assumed that criteria such as security, confidentiality, and high data transfer rate with ultra-dense networks will be the key characteristics of 2030 networks, and it should be given special attention from the research community in the field of wireless technologies. The networks 2030 are de-signed to provide terabits per second, which are expected to be achieved using a number of advanced technologies, such as MEC, FoG, mmWave, new radio, Software-defined networking and Artificial intelli-gence in networks. It is necessary to solve several important aspects in order to ensure the quality of service for the new services, first, to ensure the density of network coverage even in sparsely populates areas. The article analyzes the development of firth generation communication networks 5G/IMT-2020 and the main fundamental changes in the development of communication networks 2030.


2016 ◽  
pp. 487-522
Author(s):  
Alberto De la Rosa Algarín ◽  
Steven A. Demurjian ◽  
Timoteus B. Ziminski ◽  
Yaira K. Rivera Sánchez ◽  
Robert Kuykendall

Today's applications are often constructed by bringing together functionality from multiple systems that utilize varied technologies (e.g. application programming interfaces, Web services, cloud computing, data mining) and alternative standards (e.g. XML, RDF, OWL, JSON, etc.) for communication. Most such applications achieve interoperability via the eXtensible Markup Language (XML), the de facto document standard for information exchange in domains such as library repositories, collaborative software development, health informatics, etc. The use of a common data format facilitates exchange and interoperability across heterogeneous systems, but challenges in the aspect of security arise (e.g. sharing policies, ownership, permissions, etc.). In such situations, one key security challenge is to integrate the local security (existing systems) into a global solution for the application being constructed and deployed. In this chapter, the authors present a Role-Based Access Control (RBAC) security framework for XML, which utilizes extensions to the Unified Modeling Language (UML) to generate eXtensible Access Control Markup Language (XACML) policies that target XML schemas and instances for any application, and provides both the separation and reconciliation of local and global security policies across systems. To demonstrate the framework, they provide a case study in health care, using the XML standards Health Level Seven's (HL7) Clinical Document Architecture (CDA) and the Continuity of Care Record (CCR). These standards are utilized for the transportation of private and identifiable information between stakeholders (e.g. a hospital with an electronic health record, a clinic's electronic health record, a pharmacy system, etc.), requiring not only a high level of security but also compliance to legal entities. For this reason, it is not only necessary to secure private information, but for its application to be flexible enough so that updating security policies that affect millions of documents does not incur a large monetary or computational cost; such privacy could similarly involve large banks and credit card companies that have similar information to protect to deter identity theft. The authors demonstrate the security framework with two in-house developed applications: a mobile medication management application and a medication reconciliation application. They also detail future trends that present even more challenges in providing security at global and local levels for platforms such as Microsoft HealthVault, Harvard SMART, Open mHealth, and open electronic health record systems. These platforms utilize XML, equivalent information exchange document standards (e.g., JSON), or semantically augmented structures (e.g., RDF and OWL). Even though the primary use of these platforms is in healthcare, they present a clear picture of how diverse the information exchange process can be. As a result, they represent challenges that are domain independent, thus becoming concrete examples of future trends and issues that require a robust approach towards security.


2020 ◽  
Vol 15 (7) ◽  
pp. 39-48
Author(s):  
I. E. Mikheeva

The paper is devoted to the analysis of the legal regulation and practice of issuing digital banking guarantees using blockchain technology in Russia and the Republic of Belarus. The author concludes that the blockchain technology allows us to reduce the time necessary to issue digital bank guarantees in comparison with other ways of issuing bank guarantees. Higher security level can be provided due to the special properties of the technology used to carry out data transfer, its reporting and storage. The paper also deals with the characteristics of blockchain technology that improve protection of participants from unscrupulous actions that can take place during such actions as data encryption, the use of encryption keys and recording in the block chain. The paper examines the experience of the National Bank of the Republic of Belarus regarding the use of blockchain technology to issue and record bank guarantees. The author investigates cases when Russian banks issued bank guarantees using the Masterchain platform and prospects of development of a digital form for guarantees. In addition, the paper concludes that maintaining a ledger working on the basis of blockchain technology for accounting digital bank guarantees will minimize unfair behavior in case of their counterfeiting.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1872
Author(s):  
Yasser Albagory

Recent advances in communication systems provide an enabling technology for aircraft connection and safety. A promising communication system that uses stratospheric platforms provides an efficient and improved communication performance and can be an efficient solution for establishing communication networks for aviation. Therefore, in this paper, a novel communication network based on stratospheric basestation (SB) is proposed to provide fifth-generation (5G) and beyond services for civil aviation aircrafts to improve global flight connectivity, control, and safety. The proposed aircraft–SB network is demonstrated, and its coverage geometry is modelled and investigated. As the 5G and beyond networks use millimeter wave frequency bands (mm-wave), the performance of different atmospheric losses including gaseous absorption, rain, and fog/cloud is analyzed to investigate the system’s practical feasibility at different 5G proposed frequencies ranging from 3.5 to 66 GHz through a flight model including three distinct stages which are takeoff/landing, climbing/descending, and cruise stages. Also, handover scenarios in the proposed aircraft–SB network are investigated and analyzed at the proposed 5G frequencies. In addition, the aircraft–SB 5G network is compared to the most recent low-Earth orbit (LEO) Internet satellites where the proposed system is expected to provide low latency, less atmospheric attenuation, longer aircraft–SB link duration, and very low handover rate.


2020 ◽  
Vol 12 (20) ◽  
pp. 8405
Author(s):  
Dalė Dzemydienė ◽  
Aurelija Burinskienė ◽  
Arūnas Miliauskas

The aim of this research is forwarded for assessment of provision possibilities of the multi-componential and heterogeneous services in the fast-changing topology of cargo transportation processes. The mobile intelligent services in current transport means require the development of complex infrastructure for multi-compositional service support. Our objectives are related to the investigation in data-transfer capabilities for heterogeneous service support, which is offering some improvements for developing the infrastructure of transportation of vehicles and helping in the administration of transport processes. This research aims to develop an approach for the assessment of infrastructure for sustainable management of cargo transportation processes by roads. Such assessment is multi-layered by including the management possibilities of cargo transportation logistic processes and electronic (smart, mobile) services using current innovative software and hardware of information communication technologies (ICT). Special attention is paid for road safety, more environment cleanable, and paperless management by assessing the integration of potentials and prospects of wireless, vehicle ad-hoc communication networks (VANET), and other communication possibilities. Some requirements are revealed for such type of infrastructure for the provision of heterogeneous services. The results of the development of infrastructure demonstrate the capacities of the potential of wireless networks for the provision of high-level of multi-component, heterogeneous services.


Author(s):  
Dalė Dzemydienė ◽  
Aurelija Burinskienė ◽  
Arūnas Miliauskas

The aim of this research is forwarded for assessment of provision possibilities of the multi-componential and heterogeneous services in the fast-changing topology of cargo transportation processes. The mobile intelligent services in nowadays transport means require the development of complex infrastructure for multi-compositional service support. Our objectives are related to the investigation in data-transfer capabilities for heterogeneous service support, by offering some improvements for developing the infrastructure of transportation of vehicles by helping in the administration of transport processes. This research aims to develop an approach for assessment of infrastructure for sustainable management of cargo transportation processes by roads. Such assessment is multi-layered by including the management possibilities of cargo transportation logistic processes and electronic (smart, mobile) services by implementing of nowadays innovative software and hardware of information communication technologies (ICT). Special attention is paid for road safety, more environment cleanable, and paperless management by assessing the integration of potentials and prospects of wireless, vehicle Ad-hoc communication networks (VANET), and other communication possibilities. Some requirements are revealed for such type of infrastructure for the provision of heterogeneous services. The results of the development of infrastructure demonstrate the capacities of the potential of wireless networks for the provision of high-level of multi-component, heterogeneous services.


2020 ◽  
Author(s):  
Yanhui Liu ◽  
Jianbiao Zhang ◽  
Jing Zhan

Abstract With the development of the Internet of Things (IoT) field, more and more data are generated by IoT devices and transferred over the network. However, a large amount of IoT data is sensitive, and the leakage of such data is a privacy breach. The security of sensitive IoT data is a big issue, as the data is shared over an insecure network channel. Current solutions include symmetric encryption and access controls to secure the data transfer, but they have some drawbacks such as a single point of failure. Blockchain is a promising distributed ledger technology that can prevent the malicious tampering of data, offering reliable data storage. This paper proposes a distributed access control system based on blockchain technology to secure IoT data. The proposed mechanism is based on fog computing and the concept of the alliance chain. This method uses mixed linear and nonlinear spatiotemporal chaotic systems (MLNCML) and the least significant bit (LSB) to encrypt the IoT data on an edge node and then upload the encrypted data to the cloud. The proposed mechanism can solve the problem of a single point of failure of access control by providing the dynamic and fine-grained access control for IoT data. The experimental results of this method demonstrated that it can protect the privacy of IoT data efficiently.


2022 ◽  
pp. 60-79
Author(s):  
Dhaya R. ◽  
Kanthavel R.

The fifth generation (5G) network advancements focus to help mixed upright applications by associating heterogeneous gadgets and machines with extreme upgrades regarding high quality of administration, extended organization limit, and improved framework throughput regardless of significant difficulties like decentralization, straightforwardness, dangers of information interoperability, network protection, and security weaknesses. The challenges and limitations of other intelligent 5G intelligent internet of networks (5G IoTs) are also to be met by using blockchain technology with the integration of cloud computing and edge computing technologies. In this chapter, the authors render an elaborated analytics of the empowering of blockchain technology in intelligent networks that includes 5G networks and 5G-based IoT. The solutions for the spectrum management, data sharing, security, and privacy in 5G networks will also be analyzed. It is believed that the chapter would be useful for researchers in the field of blockchain in intelligent networks.


Sign in / Sign up

Export Citation Format

Share Document