TY - JOUR
T1 - Blockchain based integrated security measure for reliable service delegation in 6G communication environment
AU - Manogaran, Gunasekaran
AU - Rawal, Bharat S.
AU - Saravanan, Vijayalakshmi
AU - Kumar, Priyan Malarvizhi
AU - Martínez, Oscar Sanjuán
AU - Crespo, Rubén González
AU - Montenegro-Marin, Carlos Enrique
AU - Krishnamoorthy, Sujatha
N1 - Publisher Copyright:
© 2020
PY - 2020/9/1
Y1 - 2020/9/1
N2 - Sixth generation (6G) communication environment is unfolded in the recent years in order to provide high throughput less latency services for the mobile users. This environment encloses a variety of heterogeneous resources and communication standards to ensure seamless availability of services. In this open environment, security is a concerning issue due to heterogeneous standard integration and access delegations. This paper introduces blockchain-based integrated security measure (BISM) for providing secure access control and privacy preserving for the resources and the users. The access control process relies on the states of the virtualized resources at different time instances and the privacy preserving relies on longevity of service responses. The access delegation and denial is decided by the changeover of the states of the resources as aided by the Q-learning procedure for improving the service related performance. This performance for access control and privacy is verified using the metrics true positives, access denial and success ratio, access time and modification, memory utilization and time complexity.
AB - Sixth generation (6G) communication environment is unfolded in the recent years in order to provide high throughput less latency services for the mobile users. This environment encloses a variety of heterogeneous resources and communication standards to ensure seamless availability of services. In this open environment, security is a concerning issue due to heterogeneous standard integration and access delegations. This paper introduces blockchain-based integrated security measure (BISM) for providing secure access control and privacy preserving for the resources and the users. The access control process relies on the states of the virtualized resources at different time instances and the privacy preserving relies on longevity of service responses. The access delegation and denial is decided by the changeover of the states of the resources as aided by the Q-learning procedure for improving the service related performance. This performance for access control and privacy is verified using the metrics true positives, access denial and success ratio, access time and modification, memory utilization and time complexity.
UR - http://www.scopus.com/inward/record.url?scp=85089071155&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85089071155&partnerID=8YFLogxK
U2 - 10.1016/j.comcom.2020.07.020
DO - 10.1016/j.comcom.2020.07.020
M3 - Article
AN - SCOPUS:85089071155
SN - 0140-3664
VL - 161
SP - 248
EP - 256
JO - Computer Communications
JF - Computer Communications
ER -