Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/540429
Title: | Security Concerns at Different Phases of Networks through Blockchain Technology |
Researcher: | Anju Devi |
Guide(s): | Amit Kumar |
Keywords: | Computer networks--Security measures Computers Computer Science Computer Science Cybernetics Cryptography Cybernetics Data encryption (Computer science) Engineering and Technology |
University: | Jaypee University of Information Technology, Solan |
Completed Date: | 2023 |
Abstract: | A blockchain is a peer-to-peer, distributed, and decentralized network that generates a distributed ledger that provides immutability, transparency, and traceability. Each node has a copy of the distributed ledger in which data is formed as a block, and each block is connected to the preceding block in the chain. A distributed ledger is where data is recorded, and maintained, and endlessly growing transactions are recorded in an ordered manner across multiple computers. Many researchers have applied many approaches but still, there is a scope for improvement to achieve better security, privacy, transparency, efficiency, reliability, throughput, and scalability in different phases in an untrusted environment. Blockchain is used for the security purposes of devices, data, and users with different applications such as vehicles, IoT, industrial, healthcare, voting, and digital transactions. newlineThe presence of malicious nodes can degrade the performance of the system, and the validation of the block that corresponds to the selected miners allows it to be maliciously put onto the blockchain. So, to eliminate these issues used the incentive mechanisms that are a combination of DPSO and M-ITA algorithms to verify miners and blocks using blockchain technology in vehicular networks. The vehicles on the road side units share a lot of information through communication that ensures driver safety and service quality. The DPSO algorithm validates the block whereas the MITA algorithm to check the miner s is trustworthiness. The decentralized approach of this work increased the trust and utility of miner s upto 65% and 20% respectively whereas the compromised miners are reduced upto 44%. newlineMany researchers have proposed encryption schemes to protect data, but they have also led to inadequacies in most of the proposed approaches like data privacy, centralize control, security, corrupt, processing time. Encryption technology requires more time to manage keys and encrypt and decrypt data, which can result in increased vulnerability to ea |
Pagination: | xviii, 93p. |
URI: | http://hdl.handle.net/10603/540429 |
Appears in Departments: | Department of Computer Science Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 169.99 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 520.26 kB | Adobe PDF | View/Open | |
03_content.pdf | 262.68 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 249.68 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 489.5 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.29 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.09 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 989.8 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 275.04 kB | Adobe PDF | View/Open | |
11_annexures.pdf | 920.15 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 298.23 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: