Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/540429
Title: Security Concerns at Different Phases of Networks through Blockchain Technology
Researcher: Anju Devi
Guide(s): Amit Kumar
Keywords: Computer networks--Security measures
Computers
Computer Science
Computer Science Cybernetics
Cryptography
Cybernetics
Data encryption (Computer science)
Engineering and Technology
University: Jaypee University of Information Technology, Solan
Completed Date: 2023
Abstract: A blockchain is a peer-to-peer, distributed, and decentralized network that generates a distributed ledger that provides immutability, transparency, and traceability. Each node has a copy of the distributed ledger in which data is formed as a block, and each block is connected to the preceding block in the chain. A distributed ledger is where data is recorded, and maintained, and endlessly growing transactions are recorded in an ordered manner across multiple computers. Many researchers have applied many approaches but still, there is a scope for improvement to achieve better security, privacy, transparency, efficiency, reliability, throughput, and scalability in different phases in an untrusted environment. Blockchain is used for the security purposes of devices, data, and users with different applications such as vehicles, IoT, industrial, healthcare, voting, and digital transactions. newlineThe presence of malicious nodes can degrade the performance of the system, and the validation of the block that corresponds to the selected miners allows it to be maliciously put onto the blockchain. So, to eliminate these issues used the incentive mechanisms that are a combination of DPSO and M-ITA algorithms to verify miners and blocks using blockchain technology in vehicular networks. The vehicles on the road side units share a lot of information through communication that ensures driver safety and service quality. The DPSO algorithm validates the block whereas the MITA algorithm to check the miner s is trustworthiness. The decentralized approach of this work increased the trust and utility of miner s upto 65% and 20% respectively whereas the compromised miners are reduced upto 44%. newlineMany researchers have proposed encryption schemes to protect data, but they have also led to inadequacies in most of the proposed approaches like data privacy, centralize control, security, corrupt, processing time. Encryption technology requires more time to manage keys and encrypt and decrypt data, which can result in increased vulnerability to ea
Pagination: xviii, 93p.
URI: http://hdl.handle.net/10603/540429
Appears in Departments:Department of Computer Science Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File169.99 kBAdobe PDFView/Open
02_prelim pages.pdf520.26 kBAdobe PDFView/Open
03_content.pdf262.68 kBAdobe PDFView/Open
04_abstract.pdf249.68 kBAdobe PDFView/Open
06_chapter 2.pdf489.5 kBAdobe PDFView/Open
07_chapter 3.pdf1.29 MBAdobe PDFView/Open
08_chapter 4.pdf1.09 MBAdobe PDFView/Open
09_chapter 5.pdf989.8 kBAdobe PDFView/Open
10_chapter 6.pdf275.04 kBAdobe PDFView/Open
11_annexures.pdf920.15 kBAdobe PDFView/Open
80_recommendation.pdf298.23 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: