A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network
Abstract
:1. Introduction
- We propose an innovative fusion trust evaluation framework that can conduct a more comprehensive and accurate trust calculation. This framework utilizes blockchain technology to manage the trust value, and makes the management process more transparent and reliable;
- We develop an algorithm for anomaly detection and a code framework for smart contracts. Anomaly detection provides real-time testing of the system to ensure that the network can operate properly. Smart contract code serves trust management, which makes sure that trust management is carried out properly;
- We utilize software simulations to verify the feasibility of the proposed framework. Meanwhile, we compare it with a single role evaluation system, and find its superiority in terms of performance. A neural network fitting approach is also applied to trust prediction and compared with conventional linear prediction.
2. System Design
3. The Proposed Blockchain-Based Trust Evaluation Framework
3.1. Trust Calculation
- Trust value ;
- Trust is a dimensionless number;
- There exists an inverse relationship between trust and loss of information/data;
- Each layer of trust is independent.
3.1.1. Communication Layer
3.1.2. Transaction Layer
3.1.3. Fusion Trust
3.2. Fusion-Based Trust Anomaly Detection Algorithm
Algorithm 1: Fusion-based trust anomaly detection algorithm. |
Input:, , Output:, , , begin 1: detection system is ready 2: return 3: for n = 1: length() 4: 5: 6: if then 7: be considered normal 8: else 9: is added to 10: end for 11: foreach T in 12: if 13: anomaly source is in communication layer 14: elseif 15: anomaly source is in transaction layer 16: elseif 17: anomaly source is in both layers 18: return 19: end for 20: 21: return , end |
- Step 1:
- Get fusion trust values and from . After the acquisition is complete, to ensure repeat detection, it needs to be marked with and returned to the trust manager to indicate that the fusion trust value at that time has been received for detection.
- Step 2:
- Calculate . The value of is compared with . If is less than the threshold, it can be considered normal. If the value is greater than the threshold, it can be considered to have a high probability of an abnormal condition. The filtered trust values with a high probability of anomalies are stored in a list .
- Step 3:
- Calculate and . If the value is 0, then it is assumed that an abnormal condition has occurred at that layer. After all the fusion trust values have been detected, a list storing the detection results is returned.
- Step 4:
- Calculate the deviation of all trust values () judged as normal from the theoretical trust value of the system. The value of provides a comprehensive measure of the stability of nodes performing communication tasks.
- Step 5:
- When the exception detection is complete, an end flag is returned. All stored lists (, , ) will be cleared for the next round of detection.
4. Blockchain-Based Trust Management
Algorithm 2: Trust Management Based on Smart Contract. |
Input: Fusion trust Output: Ledger begin 1: % InitTrust: Initialize the ledger and assign initial values to the trust values. 2: define a structure Trust containing N,,,t,, 3: Assign an initial value to each structure element 4: % CreateTrust: Set a new trust record. 5: Define a newly written trust value 6: Check if the trust value is repeated 7: if not repeated then 8: return ctx.GetStub().PutState(N,,,t,,) 9: end if 10: % ReadTrust: Read a trust record. 11: ctx.GetStub().GetState(N,,,t,,) 12: % UpdateTrust: Update the trust value. 13: Change the value of trust 14: Check if the trust value is repeated 15: if not repeated then 16: return ctx.GetStub().PutState(N,,,t,,) 17: end if 18: % DeleteTrust: Delete a trust record. 19: return ctx.GetStub().DelState(N,,,t,,) end |
- Package the smart contract. Package smart contract into chaincode before it can be installed on peers;
- Install the chaincode package. After packaging the smart contract, we can install the chaincode on our peers. The chaincode needs to be installed on every peer that will endorse a transaction;
- Approve a chaincode definition. After installing the chaincode package, we need to approve a chaincode definition for the organizations. The definition includes the important parameters of chaincode governance such as the name, version, and the chaincode endorsement policy;
- Commit the chaincode definition to the channel. After a sufficient number of organizations have approved a chaincode definition, one organization can commit the chaincode definition to the channel. If a majority of channel members have approved the definition, the commit transaction will be successful and the parameters agreed to in the chaincode definition will be implemented on the channel;
- Invoke the chaincode. After the chaincode definition has been committed to a channel, the chaincode will start on the peers joined to the channel where the chaincode was installed. The chaincode is now ready to be invoked by client applications.
5. Results
5.1. Performance of Fusion Trust Evaluation
5.2. Performance of Trust Prediction
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Huang, T.; Yang, W.; Wu, J. A survey on green 6G network: Architecture and technologies. IEEE Access 2019, 7, 175758–175768. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N. 6G Internet of Things: A comprehensive survey. IEEE Internet Things J. 2021, 9, 359–383. [Google Scholar] [CrossRef]
- Giordani, M.; Polese, M.; Mezzavilla, M. Toward 6G networks: Use cases and technologies. IEEE Commun. Mag. 2020, 58, 55–61. [Google Scholar] [CrossRef]
- Wang, C.X.; Huang, J.; Wang, H. 6G wireless channel measurements and models: Trends and challenges. IEEE Veh. Technol. Mag. 2020, 15, 22–32. [Google Scholar] [CrossRef]
- Abdel Hakeem, S.A.; Hussein, H.H.; Kim, H.W. Security requirements and challenges of 6G technologies and applications. Sensors 2022, 22, 1969. [Google Scholar] [CrossRef]
- Wang, M.; Lin, Y.; Tian, Q. Transfer learning promotes 6G wireless communications: Recent advances and future challenges. IEEE Trans. Reliab. 2021, 70, 790–807. [Google Scholar] [CrossRef]
- Ranjha, A.; Javed, M.A.; Srivastava, G.; Lin, J.C.W. Intercell Interference Coordination for UAV enabled URLLC with perfect/imperfect CSI using cognitive radio. IEEE Open J. Commun. Soc. 2022, 4, 197–208. [Google Scholar] [CrossRef]
- Asif, M.; Ihsan, A.; Khan, W.U.; Zhang, S.; Wu, S.X. Energy-efficient backscatter-assisted coded cooperative noma for b5g wireless communications. IEEE Trans. Green Commun. Netw. 2022, 7, 70–83. [Google Scholar] [CrossRef]
- Wang, Z.; Yu, X.; Xue, P. Research on Medical Security System Based on Zero Trust. Sensors 2023, 23, 3774. [Google Scholar] [CrossRef]
- Basan, E.; Basan, A.; Nekrasov, A. Trusted Operation of Cyber-Physical Processes Based on Assessment of the System’s State and Operating Mode. Sensors 2023, 23, 1996. [Google Scholar] [CrossRef]
- Peng, C.; Sun, H.; Yang, M. A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1554–1569. [Google Scholar] [CrossRef]
- Yu, X.; Xu, D.; Sun, Y. Robust and secure wireless communications via intelligent reflecting surfaces. IEEE J. Sel. Areas Commun. 2020, 38, 2637–2652. [Google Scholar] [CrossRef]
- Luo, W.; Ma, W.; Gao, Q. A dynamic trust management system for wireless sensor networks. Secur. Commun. Netw. 2016, 9, 613–621. [Google Scholar] [CrossRef] [Green Version]
- Yang, Z.; Yang, K.; Lei, L. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
- Pirayesh, H.; Zeng, H. Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2022, 24, 767–809. [Google Scholar] [CrossRef]
- Petrillo, A.; Pescape, A.; Santini, S. A secure adaptive control for cooperative driving of autonomous connected vehicles in the presence of heterogeneous communication delays and cyberattacks. IEEE Trans. Cybern. 2020, 51, 1134–1149. [Google Scholar] [CrossRef]
- Zhou, L.; Xu, B.W.; Zhong, W. Device-independent quantum secure direct communication with single-photon sources. Phys. Rev. Appl. 2023, 19, 014036. [Google Scholar] [CrossRef]
- Vashishtha, P.; Goswami, L.; Jain, S.K. GaN-djoser pyramidal self powered UV photodetector for optical signal detection in rugged environments. J. Alloys Compd. 2023, 930, 167267. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, J.; Li, J. Machine learning for the detection and identification of Internet of Things devices: A survey. IEEE Internet Things J. 2021, 9, 298–320. [Google Scholar] [CrossRef]
- Yin, C.; Zhang, S.; Wang, J. Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans. Syst. Man Cybern. Syst. 2020, 52, 112–122. [Google Scholar] [CrossRef]
- Su, W.; Liao, Y. A jury-based trust management mechanism in distributed cognitive radio networks. China Commun. 2015, 12, 119–126. [Google Scholar] [CrossRef]
- Wei, L.; Wu, J.; Long, C. Enhancing trust management via blockchain in Social Internet of Things. In Proceedings of the 2020 Chinese Automation Congress, Shanghai, China, 6–8 November 2020. [Google Scholar]
- Wang, D.; Chen, X.; Wu, H. A blockchain-based vehicle-trust management framework under a crowdsourcing environment. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 29 December 2020–1 January 2021. [Google Scholar]
- Zubaydi, H.D.; Varga, P.; Molnár, S. Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review. Sensors 2023, 23, 788. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Pathirana, P.N.; Ding, M. Blockchain for 5G and beyond networks: A state of the art survey. J. Netw. Comput. Appl. 2020, 166, 102693. [Google Scholar] [CrossRef]
- Xu, G.; Bai, H.; Xing, J. SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles. J. Parallel Distrib. Comput. 2022, 164, 1–11. [Google Scholar] [CrossRef]
- Li, Y.; Qiao, L.; Lv, Z. An optimized byzantine fault tolerance algorithm for consortium blockchain. Peer—Peer Netw. Appl. 2021, 14, 2826–2839. [Google Scholar] [CrossRef]
- Centobelli, P.; Cerchione, R.; Del Vecchio, P. Blockchain technology for bridging trust, traceability and transparency in circular supply chain. Inf. Manag. 2022, 59, 103508. [Google Scholar] [CrossRef]
- Wang, Z.; Lin, J.; Cai, Q. Blockchain-based certificate transparency and revocation transparency. IEEE Trans. Dependable Secur. Comput. 2020, 19, 681–697. [Google Scholar] [CrossRef]
- Li, Z.; Kang, J.; Yu, R. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Inform. 2017, 14, 3690–3700. [Google Scholar] [CrossRef] [Green Version]
- Gai, K.; Wu, Y.; Zhu, L. Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans. Ind. Inform. 2019, 15, 3548–3558. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Irshad, A.; Khan, M.A. A lightweight authentication scheme for 6G-IoT enabled maritime transport system. IEEE Trans. Intell. Transp. Syst. 2021, 24, 2401–2410. [Google Scholar] [CrossRef]
- Khowaja, S.A.; Khuwaja, P.; Dev, K. A secure data sharing scheme in Community Segmented Vehicular Social Networks for 6G. IEEE Trans. Ind. Inform. 2022, 19, 890–899. [Google Scholar] [CrossRef]
- Christidis, K.; Devetsikiotis, M. Blockchains and smart contracts for the internet of things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
- Chen, P.; Shi, L.; Fang, Y.; Lau, F.C.; Cheng, J. Rate-diverse multiple access over Gaussian channels. IEEE Trans. Wirel. Commun. 2023, 99, 116. [Google Scholar] [CrossRef]
Notation | Meaning |
---|---|
The amount of change in the trust value. | |
A fixed value of trust. | |
Trust threshold for anomaly detection. | |
The high-risk interval. | |
The low-risk interval. | |
The fusion trust value at the nth iteration. | |
List of stored fusion trust values tagged with serial number i. | |
The token that needs to be returned is tagged with detection time t. | |
List of stored abnormal fusion trust values tagged with detection time t. | |
List of detection results. R: abnormal or not, S: source of anomaly. | |
Measuring the degree of deviation between normal trust value and . | |
Status flag for the end of anomaly detection. | |
NT | Fusion trust values which are determined to be normal. |
Conclusion | ||
---|---|---|
0 | 0 | Both layers are abnormal. |
0 | × | Communication layer is abnormal. |
× | 0 | Transaction layer is abnormal. |
× | × | Both layers are normal. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yin, Y.; Fang, H. A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network. Sensors 2023, 23, 6751. https://doi.org/10.3390/s23156751
Yin Y, Fang H. A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network. Sensors. 2023; 23(15):6751. https://doi.org/10.3390/s23156751
Chicago/Turabian StyleYin, Yujia, and He Fang. 2023. "A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network" Sensors 23, no. 15: 6751. https://doi.org/10.3390/s23156751
APA StyleYin, Y., & Fang, H. (2023). A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network. Sensors, 23(15), 6751. https://doi.org/10.3390/s23156751