Results

Publications

A Blockchain-Enabled Approach for Secure Data Sharing in 6G-based Internet of Things Networks

Abstract

The 6th generation of wireless networks (6G) promises to provide ultra-reliable, high-speed, and low-latency communication for Internet of Things (IoT) devices. However, securing data transmission and storage in these networks is a critical challenge due to potential security threats. Blockchain technology provides a solution to enhance security in IoT networks by enabling secure, decentralized, and tamper-proof data sharing. In this paper, we proposed a novel solution for securing data sharing and storage in 6G-based IoT networks using blockchain technology, hybrid encryption, and IPFS. The proposed approach consists of four algorithms that enhance the security of the system: a user authentication algorithm, a data access algorithm, a data storage algorithm, and a secure data sharing algorithm. The secure data sharing algorithm enables secure, tamper-proof data sharing among authorized devices using a permissioned blockchain. These algorithms are implemented using hybrid encryption, which ensures data confidentiality, and have been evaluated for their effectiveness in enhancing security in 6G-based IoT networks. Our work contributes to the growing body of research on blockchain-enabled solutions for securing data in IoT networks and provides insights into the potential of blockchain technology, hybrid encryption, and IPFS to enhance security in 6G-based IoT networks. The proposed approach using these algorithms provides secure and tamper-proof data sharing, making the system more secure and reliable. We presented the technical details of our approach and evaluate its effectiveness in terms of security, with a particular focus on the role of hybrid encryption and IPFS in enhancing the security and reliability of the system. Our results demonstrate that the proposed approach enhances data security in 6G-based IoT networks by providing secure and tamper-proof data sharing. The use of hybrid encryption and IPFS makes the system more secure and reliable, with hybrid encryption ensuring data confidentiality and IPFS providing decentralized and fault-tolerant storage.

Journal/Conference Information

Wireless Networks Cyber Security Threats and Countermeasures,Publisher: Springer, ISBN: 978-3-031-33631-7, Volume: 1, Edition: 1, Year: 2023, Pages Range: 1-348,