Skip to main content

An Energy-Efficient Mechanism Using Blockchain Technology for Machine-Type Communication in LTE Network

  • Conference paper
  • First Online:
Computational Intelligence in Machine Learning (ICCIML 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1106))

  • 86 Accesses

Abstract

Machine-type communication (MTC) is a well-known approach for communication in the long-term evaluation (LTE) networks. However, there is no proper study on handling the network lifetime of MTC devices owing to deficient energy efficient management. This paper intends to propose optimal cluster head selection (CHS). It is vital to select an optimal node for each cluster. We proposed a whale tri-level update (WTL) approach for selecting the CH. As a novelty in the proposed methodology, the selected cluster head checks the energy level for different intervals. Once the energy level is below the threshold, then cluster head is replaced which is handled by blockchain technology. The proposed structure makes a guide for efficient energy utilization in MTC. The performance computation of the proposed work was done in MATLAB and proved better over existing models with respect to computational time and network life time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cao J, Ma M, Li H (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surveys Tutor 16(1):283–301

    Google Scholar 

  2. Krishna Jyothi K, Chaudhari S (2019) A secure cluster-based authentication and key management protocol for machine-type communication in the LTE network. Int J Comput Appl 2019:1–11

    Google Scholar 

  3. Jyothi KK, Chaudhari S (2020) Survey on MTC group authentication and key management for MTC in LTE networks. ICDSMLA 2019: 753–759

    Google Scholar 

  4. Kalyani G, Chaudhari S (2021) Enhanced privacy preservation in the routing layer with variable-length packet data for attack free IoT sector. J Eng Sci Technol Rev 14(1):95–99

    Google Scholar 

  5. Kalyani G, Chaudhari S (2020) Survey on 6LoWPAN security protocols in IoT communication. In: ICDSMLA 2019. Springer, Singapore, 696–702

    Google Scholar 

  6. Jyothi KK, Chaudhari S (2020) Optimized neural network model for attack detection in LTE network. Comput Electr Eng 88:106879

    Google Scholar 

  7. Zhang A, Chen J, Hu RQ, Qian Y (2016) SeDS: secure data sharing strategy for D2D communication in LTE-advanced networks. IEEE Trans Vehic Technol 65(4):2659–2672

    Google Scholar 

  8. Jyothi KK, Chaudhari S (2020) A novel block chain based cluster head authentication protocol for machine-type communication in LTE network: statistical analysis on attack detection. J King Saud Univ Comput Inf Sci

    Google Scholar 

  9. Lai C, Lix H, Lu R, Shen X. A unified end-to-end security scheme for machine-type communication in LTE networks. In: 2nd IEEE/CIC international conference on communications in China (ICCC), pp 698–703

    Google Scholar 

  10. Kalyani G, Chaudhari S (2020) An efficient approach for enhancing security in Internet of Things using the optimum authentication key. Int J Comput Appl 42(3):306–314

    Google Scholar 

  11. Lai C, Lu R, Zheng D, Li H, Shen XS (2015) Toward secure large-scale machine-to-machine communications in 3GPP networks: challenges and solutions. In: IEEE communications magazine—communications standards supplement, Dec 2015, pp 12–19

    Google Scholar 

  12. Gupta S, Parne BL, Chaudhari NS (2018) DGBES: dynamic group based efficient and secure authentication and key agreement protocol for MTC in LTE/LTE-A networks. Wirel Personal Commun 98(3):2867–2899

    Google Scholar 

  13. Singh G, Shrimankar DD (2018) Dynamic group based efficient access authentication and key agreement protocol for MTC in LTE-A networks. Wirel Personal Commun 101(2):829–856

    Google Scholar 

  14. Choi D, Choi H-K, Lee S-Y (2014) A group-based security protocol for machine-type communications in LTE-advanced. Wirel Netw

    Google Scholar 

  15. Srinidhi V, Lakshmy KV, Sethumadhavan M (2019) HGKA: hierarchical dynamic group key agreement protocol for machine type communication in LTE networks. In: Security in computing and communications, pp 231–241, Jan 2019

    Google Scholar 

  16. Panda PK, Chattopadhyay S (2019) An improved authentication and security scheme for LTE/LTE-A networks. J Amb Intell Human Comput

    Google Scholar 

  17. Zhang W, Zhang Y, Chen J, Li H, Wang Y (2013) End-to-end security scheme for machine type communication based on generic authentication architecture. Cluster Comput

    Google Scholar 

  18. Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57(17):3492–3510

    Google Scholar 

  19. Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16

    Google Scholar 

  20. Liu Z et al (2020) A blockchain-enabled secure power trading mechanism for smart grid employing wireless networks. IEEE Access 8:177745–177756

    Google Scholar 

  21. Sharma A et al (2020) Blockchain based smart contracts for internet of medical things in e-healthcare. Electronics 9(10):1609

    Google Scholar 

  22. Nguyen GN et al (2020) Blockchain enabled energy efficient red deer algorithm based clustering protocol for pervasive wireless sensor networks. Sustain Comput Inf Syst 28:100464

    Google Scholar 

  23. Shahbazi Z, Byun Y-C (2020) Towards a secure thermal-energy aware routing protocol in wireless body area network based on blockchain technology. Sensors 20(12):3604

    Article  Google Scholar 

  24. Mirjalili S, Lewisa A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67. https://doi.org/10.1016/j.advengsoft.2016.01.008

    Article  Google Scholar 

  25. Venkata Rao R. Jaya: a simple and new optimization algorithm for solving constrained and unconstrained optimization problems. Int J Industr Eng Comput 7:19–34. https://doi.org/10.5267/j.ijiec.2015.8.004

  26. Kalyani G, Chaudhari S (2019) Data privacy preservation in MAC aware Internet of things with optimized key generation. J King Saud Univ Comput Inf Sci

    Google Scholar 

  27. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61

    Google Scholar 

  28. Jyothi KK, Chaudhari S (2020) Cluster-based authentication for machine type communication in LTE network using elliptic curve cryptography. Int J Cloud Comput 9(2–3):258–284

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Krishna Jyothi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krishna Jyothi, K., Kalyani, G., Srilakshmi, K., Chaudhari, S., Likhitha, M., Sriya, K. (2024). An Energy-Efficient Mechanism Using Blockchain Technology for Machine-Type Communication in LTE Network. In: Gunjan, V.K., Kumar, A., Zurada, J.M., Singh, S.N. (eds) Computational Intelligence in Machine Learning. ICCIML 2022. Lecture Notes in Electrical Engineering, vol 1106. Springer, Singapore. https://doi.org/10.1007/978-981-99-7954-7_12

Download citation

Publish with us

Policies and ethics