Analysis of Blockchain Protocol Using Machine Learning for Lightweight Cryptography

Authors

  • Nilesh Goriya, Viral Patel, Upendra Bhoi, Nainesh Nagekar

Keywords:

Blockchain Technology , Lightweight Cryptography ,Resource-Constrained Environments ,Internet of Things (IoT) , Decentralized Security , Computational Overhead

Abstract

Anonymity, security, immutability, and audibility are four of blockchain's important properties that have garnered a lot of attention recently. The Internet of Things is only one of many non-monetary uses for blockchain technology. While present-day blockchain technology works well under more ideal conditions, it runs into problems when used in places with limited resources. In such limited contexts, conventional cryptographic techniques, developed for stronger systems, can impose a heavy computational burden. This limits the efficacy of blockchain applications by impeding their scalability and performance. The problem with the current approach is that it uses very computationally intensive cryptographic processes, which might be a bottleneck for devices with less power and memory. By offering cryptographic methods tailored to reduce computing cost, lightweight cryptography provides a more efficient option. Our suggested solution focuses on incorporating lightweight cryptography into blockchain in order to circumvent this obstacle. To drastically cut down on the blockchain system's resource consumption, our suggested approach makes use of lightweight cryptographic primitives. This allows the system to be deployed and operated successfully even in contexts with limited resources, while also improving its overall efficiency. Blockchain technology offers public digital ledgers and decentralised security, however it isn't ideal for devices with limited resources because of its high energy consumption, processing overhead, and significant delays.

Downloads

Download data is not yet available.

References

1.Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Decentralized business review (2008).

Kumar Saurabh and Ashutosh Saxena. “Blockchain Technology concepts and applications.” Book, Wiley Emerging Technology Series.

Rolfes, Carsten, Axel Poschmann, Gregor Leander, and Christof Paar. "Ultra-lightweight implementations for smart devices–security for 1000 gate equivalents." In Smart Card Research and Advanced Applications: 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings 8, pp. 89-103. Springer Berlin Heidelberg, 2008.

Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "The internet of things: A survey." Computer networks 54, no. 15 (2010): 2787-2805.

Weis, Stephen A., Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. "Security and privacy aspects of low-cost radio frequency identification systems." In Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers, pp. 201-212. Springer Berlin Heidelberg, 2004.

Chen, Min, Sergio Gonzalez, Athanasios Vasilakos, Huasong Cao, and Victor CM Leung. "Body area networks: A survey." Mobile networks and applications 16 (2011): 171-193.

Zhang, Guang He, Carmen Chung Yan Poon, and Yuan Ting Zhang. "A review on body area networks security for healthcare." International Scholarly Research Notices 2011 (2011).

O'Melia, Sean, and Adam J. Elbirt. "Enhancing the performance of symmetric-key cryptography via instruction set extensions." IEEE transactions on very large scale integration (VLSI) systems 18, no. 11 (2009): 1505-1518.

Elbirt, Adam J. "Fast and efficient implementation of AES via instruction set extensions." In 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), vol. 1, pp. 396-403. IEEE, 2007.

Constantin, Jeremy Hugues-Felix, Andreas Peter Burg, and Frank K. Gurkaynak. "Investigating the potential of custom instruction set extensions for SHA-3 candidates on a 16-bit microcontroller architecture." (2012).

Martín, Honorio, Pedro Peris-Lopez, Juan E. Tapiador, and Enrique San Millán. "An estimator for the ASIC footprint area of lightweight cryptographic algorithms." IEEE Transactions on Industrial Informatics 10, no. 2 (2013): 1216-1225.

Law, Yee Wei, Jeroen Doumen, and Pieter Hartel. "Survey and benchmark of block ciphers for wireless sensor networks." ACM Transactions on Sensor Networks (TOSN) 2, no. 1 (2006): 65-93.

Biryukov, Alex, and Leo Perrin. "State of the art in lightweight symmetric cryptography." Cryptology ePrint Archive (2017).

Batina, Lejla, Amitabh Das, Barış Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, and Tolga Yalçın. "Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures." In Radio Frequency Identification: Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers 9, pp. 103-112. Springer Berlin Heidelberg, 2013.

Ågren, Martin. "On some symmetric lightweight cryptographic designs." (2012).

Mahmood, Khalid, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, and Arun Kumar Sangaiah. "An elliptic curve cryptography based lightweight authentication scheme for smart grid communication." Future Generation Computer Systems 81 (2018): 557-565.

Odlyzko, Andrew M. "Discrete logarithms in finite fields and their cryptographic significance." In Workshop on the Theory and Application of of Cryptographic Techniques, pp. 224-314. Berlin, Heidelberg: Springer Berlin Heidelberg, 1984.

Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126.

Chien, Hung-Yu, and Chi-Sung Laih. "ECC-based lightweight authentication protocol with untraceability for low-cost RFID." Journal of parallel and distributed computing 69, no. 10 (2009): 848-853.

Dutta, Indira Kalyan, Bhaskar Ghosh, and Magdy Bayoumi. "Lightweight cryptography for internet of insecure things: A survey." In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0475-0481. IEEE, 2019.

Downloads

Published

23.07.2024

How to Cite

Nilesh Goriya. (2024). Analysis of Blockchain Protocol Using Machine Learning for Lightweight Cryptography. International Journal of Intelligent Systems and Applications in Engineering, 12(22s), 540–546. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6498

Issue

Section

Research Article