Blockchain Security System in Multi-Way Direction over Distributed System Using RPBB-24-3 Algorithm

International Journal of Electrical and Electronics Engineering
© 2024 by SSRG - IJEEE Journal
Volume 11 Issue 7
Year of Publication : 2024
Authors : C. Bagath Basha, S. Rajaprakash, K. Karthik, M.D. Riyazuddin, S. Kavitha, T.K.S. Rathish Babu
pdf
How to Cite?

C. Bagath Basha, S. Rajaprakash, K. Karthik, M.D. Riyazuddin, S. Kavitha, T.K.S. Rathish Babu, "Blockchain Security System in Multi-Way Direction over Distributed System Using RPBB-24-3 Algorithm," SSRG International Journal of Electrical and Electronics Engineering, vol. 11,  no. 7, pp. 280-290, 2024. Crossref, https://doi.org/10.14445/23488379/IJEEE-V11I7P125

Abstract:

A number of technologies are gaining prominence in the current world, and one of such technologies is the Block Chain. The technology in issue provides an incredibly high degree of security; it is quite resilient. Users are not privy to a great deal of information about Block Chain; nonetheless, the functionality of its security is used to protect the data that is sent in several directions. This particular user proceeded to make use of the “Salsa” and RBJ25 algorithms, both of which are regarded as being compact and secure variations. Within the scope of this paper, we will introduce the new security mechanism that we have chosen to refer to as RPBB24-3. Encryption and decryption are the two components that comprise the RPBB-24-3 method. Both of these components are essential to the process. In order to complete the encryption process, there are five processes needed. In this process, the first step is to use the column functions on GT. The second step in the process is to use the “lattin letter” and multiply the value by four using Equation (1). The third step uses encrypted data to swap the cell values, but the process starts with the 0th cell value from the most recent cell value. In the fourth step, the prime key is split into the values of the matrix cells. The fifth step in the process is to use the “SalSa” method in the grid. Last but not least, the plain text is changed into secret text. The decryption process works the other way around from the encryption process. The suggested method is safer than the standard way that is being used.

Keywords:

Blockchain, Decryption, Encryption, Performance, RBJ25, RPBB-24-3, Salsa.

References:

[1] Saurabh Singh, A.S.M. Sanwar Hosen, and Byungun Yoon, “Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network,” IEEE Access, vol. 9, pp. 13938-13959, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Muhammad Nasir Mumtaz Bhutta et al., “A Survey on Blockchain Technology: Evolution, Architecture and Security,” IEEE Access, vol. 9, pp. 61048-61073, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mubashar Iqbal, and Raimundas Matulevicius, “Exploring Sybil and Double-Spending Risks in Blockchain Systems,” IEEE Access, vol. 9, pp. 76153-76177, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Shailendra Rathore, Jong Hyuk Park, and Hangbae Chang, “Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT,” IEEE Access, vol. 9, pp. 90075-90083, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ranwa Al Mallah, David Lopez, and Bilal Farooq, “Cyber-Security Risk Assessment Framework for Blockchains in Smart Mobility,” IEEE Open Journal of Intelligent Transportation Systems, vol. 2, pp. 294-311, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Elham A. Shammar, Ammar T. Zahary, and Asma A. Al-Shargabi, “A Survey of IoT and Blockchain Integration: Security Perspective,” IEEE Access, vol. 9, pp. 156114-156150, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Junyu Ren et al., “Task Offloading Strategy with Emergency Handling and Blockchain Security in SDN-Empowered and Fog-Assisted Healthcare IoT,” Tsinghua Science and Technology, vol. 27, no. 4, pp. 760-776, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Antonio J. Cabrera-Gutierrez et al., “Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks,” IEEE Access, vol. 10, pp. 114331-114345, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Yunyeong Goh et al., “Secure Trust-Based Delegated Consensus for Blockchain Frameworks Using Deep Reinforcement Learning,” IEEE Access, vol. 10, pp. 118498-118511, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] P. Muralidhara Rao et al., “Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges,” IEEE Access, vol. 11, pp. 54476-54494, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Garima Thakur et al., “An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment,” IEEE Access, vol. 11, pp. 26877-26892, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Leonardo Da Costa et al., “Sec-Health: A Blockchain-Based Protocol for Securing Health Records,” IEEE Access, vol. 11, pp. 16605- 16620, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Lina Li et al., “A Secure, Reliable and Low-Cost Distributed Storage Scheme Based on Blockchain and IPFS for Firefighting IoT Data,” IEEE Access, vol. 11, pp. 97318-97330, 2023.
[CrossRef] [Google Scholar] [Publisher Link]