Blockchain and 6G Trustworthy Networking

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (31 August 2023) | Viewed by 4460

Special Issue Editors


E-Mail Website
Guest Editor
Telecommunications and Networking (TeleCoN) Research Center, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Topi, Pakistan
Interests: computer networks; wireless communications; distributed systems

E-Mail Website
Guest Editor
1. Computer Engineering Department, College of Information Technology, University of Bahrain, Zallaq, Bahrain
2. School of Engineering, Edith Cowan University, Joondalup, WA, Australia
Interests: wireless communication; vehicular networks; fog computing; mobile edge computing; Internet of Things; information theoretic security

Special Issue Information

Dear Colleagues,

With the successful deployment of fifth-generation (5G) wireless networks, research has commenced on sixth-generation (6G) wireless networks, which are expected to meet the requirements of the Internet of Everything (IoE) applications to support the future of a data-intensive intelligent society. However, this objective is hampered by numerous trust-related challenges. Blockchain has emerged as an innovative technology to provide a promising solution to advance the functional standards of 6G networks. Researchers and industry experts envision blockchain as one of the most important enabling technologies to address the limitations of 5G networks and assist in realizing advanced IoE applications for 6G with enhanced efficiency and security.

This Special Issue will publish high-quality, original research papers in the field of 6G trustworthy networking using blockchain. The topics of interest include but are not limited to:

  • The role of blockchain in addressing significant challenges in 6G;
  • Cooperative trust among separate network entities;
  • Tracing, certification, and supervision functionalities;
  • Unified frameworks for blockchain radio access networks ;
  • Efficient resource sharing;
  • Trusted data interaction;
  • Trustworthy and secure paradigm for 6G networking;
  • Consensus mechanisms;
  • Smart contract;
  • Secure access control;
  • Privacy protection;
  • Trustworthy access;
  • Cross-network sharing;
  • Data tracking, auditing, and intelligent networking.

Dr. Ghulam Abbas
Dr. Muhammad Waqas
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 6G wireless communications
  • trust-related challenges
  • functional standards of the 6G networks
  • enhanced efficiency and security
  • blockchain
  • cooperative trust
  • trusted data interaction
  • trustworthy and secure paradigm for 6G networking
  • secure access control
  • privacy protection
  • trustworthy access

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 4133 KiB  
Article
Deep Learning-Based Efficient Analysis for Encrypted Traffic
by Xiaodan Yan
Appl. Sci. 2023, 13(21), 11776; https://doi.org/10.3390/app132111776 - 27 Oct 2023
Cited by 1 | Viewed by 1270
Abstract
To safeguard user privacy, critical Internet traffic is often transmitted using encryption. While encryption is crucial for protecting sensitive information, it poses challenges for traffic identification and poses hidden dangers to network security. As a result, the precise classification of encrypted network traffic [...] Read more.
To safeguard user privacy, critical Internet traffic is often transmitted using encryption. While encryption is crucial for protecting sensitive information, it poses challenges for traffic identification and poses hidden dangers to network security. As a result, the precise classification of encrypted network traffic has become a crucial problem in network security. In light of this, our paper proposes an encrypted traffic identification method based on the C-LSTM model for encrypted traffic recognition by leveraging the power of deep learning. This method can effectively extract spatial and temporal features from encrypted traffic, enabling accurate identification of traffic types. Through rigorous testing and evaluation, our system has achieved an impressive accuracy rate of 96.4% on the widely used ISCXVPN2016 dataset. This achievement demonstrates the effectiveness and reliability of our method in accurately classifying encrypted network traffic. By addressing the challenges posed by encrypted traffic identification, our research contributes to enhancing network security and privacy protection. Full article
(This article belongs to the Special Issue Blockchain and 6G Trustworthy Networking)
Show Figures

Figure 1

20 pages, 948 KiB  
Article
Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices
by Xiaodan Yan, Shanshan Tu, Hisham Alasmary and Fengming Huang
Appl. Sci. 2023, 13(20), 11269; https://doi.org/10.3390/app132011269 - 13 Oct 2023
Cited by 1 | Viewed by 910
Abstract
Fog computing accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end users and/or fog servers brings a significant dilemma in implementing [...] Read more.
Fog computing accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end users and/or fog servers brings a significant dilemma in implementing fog computing. The computational power of the resources constrains Internet of Things (IoT) devices in the fog-computing environment. Therefore, an attacker can easily attack. The traditional methods like attribute-based encryption (ABE) techniques are inappropriate for resource-constraint devices with protracted computing and limited computational capabilities. In this regard, we investigate a multiauthority ciphertext policy-attribute-based encryption (MA-CP-ABE) method that enables multiauthority attribute revocation and computation outsourcing. Moreover, the encryption and decryption processes of resource-constraint IoT devices are outsourced to the fog nodes. In this way, it also reduces the computational burden of the resource-constraint IoT devices. Hence, we propose MA-CP-ABE for encryption and decryption, attribute revocation and outsourcing by reducing the computational burden and securing the system. We compare the computational offloading approach with the existing techniques to prove that the proposed approach outperforms the existing approaches. The proposed method reduces the operation time for the encryption and decryption process. We outsource cryptography operations to the fog node, reducing the end user’s computational cost. Eventually, simulated outcomes are used to assess the algorithm’s computational cost. Full article
(This article belongs to the Special Issue Blockchain and 6G Trustworthy Networking)
Show Figures

Figure 1

17 pages, 575 KiB  
Article
A Trusted Federated Incentive Mechanism Based on Blockchain for 6G Network Data Security
by Yihang Luo, Bei Gong, Haotian Zhu and Chong Guo
Appl. Sci. 2023, 13(19), 10586; https://doi.org/10.3390/app131910586 - 22 Sep 2023
Cited by 1 | Viewed by 749
Abstract
The machine learning paradigms driven by the sixth-generation network (6G) facilitate an ultra-fast and low-latency communication environment. However, specific research and practical applications have revealed that there are still various issues regarding their applicability. A system named Incentivizing Secure Federated Learning Systems (ISFL-Sys) [...] Read more.
The machine learning paradigms driven by the sixth-generation network (6G) facilitate an ultra-fast and low-latency communication environment. However, specific research and practical applications have revealed that there are still various issues regarding their applicability. A system named Incentivizing Secure Federated Learning Systems (ISFL-Sys) is proposed, consisting of a blockchain module and a federated learning module. A data-security-oriented trustworthy federated learning mechanism called Efficient Trustworthy Federated Learning (ETFL) is introduced in the system. Utilizing a directed acyclic graph as the ledger for edge nodes, an incentive mechanism has been devised through the use of smart contracts to encourage the involvement of edge nodes in federated learning. Experimental simulations have demonstrated the efficient security of the proposed federated learning mechanism. Furthermore, compared to benchmark algorithms, the mechanism showcases improved convergence and accuracy. Full article
(This article belongs to the Special Issue Blockchain and 6G Trustworthy Networking)
Show Figures

Figure 1

18 pages, 799 KiB  
Article
Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain
by Tianqi Peng, Bei Gong and Jiangjiang Zhang
Appl. Sci. 2023, 13(18), 10151; https://doi.org/10.3390/app131810151 - 08 Sep 2023
Cited by 1 | Viewed by 868
Abstract
The blockchain-based searchable symmetric encryption (SSE) scheme allows the retrieval and verification of outsourced data on cloud servers in sixth generation (6G) networks while ensuring the privacy of data. However, existing schemes are challenging to comprehensively meet the requirements of 6G-based intelligent application [...] Read more.
The blockchain-based searchable symmetric encryption (SSE) scheme allows the retrieval and verification of outsourced data on cloud servers in sixth generation (6G) networks while ensuring the privacy of data. However, existing schemes are challenging to comprehensively meet the requirements of 6G-based intelligent application systems for low latency, high security, and high reliability. To address these limitations, we present VSSE, a novel blockchain-based SSE scheme designed for 6G-based intelligent application systems. Our scheme constructs a state chain structure to resist file injection attacks, thereby ensuring forward privacy. Moreover, we execute the search and verification operations separately on the cloud server and blockchain, while introducing a bitmap index structure and message authentication code (MAC) technology to achieve efficient searching and dynamic verification. Notably, VSSE also includes access control functionality, permitting only authorized users to access relevant files. The combination of remarkable efficiency and strong security establishes our VSSE as an ideal solution suitable for implementation in G-based intelligent application systems. Full article
(This article belongs to the Special Issue Blockchain and 6G Trustworthy Networking)
Show Figures

Figure 1

Back to TopTop