Blockchain Applications in Network Security and Secure Transactions

Authors

  • Ritika Gaurav Chaudhary Jain Deemed to be University, Bangalore, India Author

DOI:

https://doi.org/10.15662/IJARCST.2021.0401001

Keywords:

Blockchain, Network Security, Secure Transactions, Consensus Mechanisms, Smart Contracts, Data Integrity, Permissioned Blockchain, Scalability, DDoS Mitigation, Zero-Trust Architecture

Abstract

Blockchain technology has emerged as a transformative innovation, promising to revolutionize network security and secure financial and non-financial transactions. This paper investigates the state of blockchain applications within the domains of network security and secure transactions as of 2020. We review the underlying principles of blockchain—decentralization, immutability, and consensus mechanisms—and their implications for securing networked environments. We examine key use cases such as distributed denial-of-service (DDoS) mitigation, secure smart contract execution, and data integrity verification. The study employs a mixed-methods approach, combining a structured literature review with analysis of proof-of-concept implementations documented in 2020. Specifically, we evaluate performance metrics (latency, throughput), security enhancements (attack resistance), and implementation constraints (computational overhead, scalability). Our findings indicate that blockchain integration enhances resilience against routing attacks, tampering, and insider threats by providing immutable audit trails and enabling trustless verification. Yet challenges persist, including scalability limitations, energy consumption concerns, and interoperability with legacy systems. We discuss promising hybrid architectures—such as permissioned blockchains and blockchain‑edge integrations—that mitigate these issues. The discussion highlights that while blockchain contributes substantially to integrity and trust-enhancement in network security, practical deployment demands careful orchestration of consensus protocols, network design, and regulatory compliance. We conclude by proposing future work focused on lightweight consensus mechanisms, quantum-resistant cryptographic primitives, and integration with emerging paradigms such as zero-trust architectures. This paper contributes to the academic discourse by synthesizing 2020’s relevant literature and identifying concrete pathways for advancing the secure deployment of blockchain in networked systems.

References

1. Zhang, Y., Chen, X., & Liu, M. (2020). A permissioned blockchain framework for collaborative DDoS mitigation at the edge. Proceedings of IEEE INFOCOM 2020.

2. Lekkala, C. (2019). Optimizing Data Reliability and Consistency in Hadoop Environments by Introducing ACID Capabilities. European Journal of Advances in Engineering and Technology, 6(5), 73-78.

3. Kim, J., & Lee, H. (2020). Smart contract–based secure routing protocol design for ad hoc networks. IEEE Transactions on Mobile Computing, 19(7), 1504–1516.

4. Sugumar, Rajendran (2019). Rough set theory-based feature selection and FGA-NN classifier for medical data classification (14th edition). Int. J. Business Intelligence and Data Mining 14 (3):322-358.

5. Gupta, S., Rao, N., & Singh, P. (2020). Blockchain-enabled immutable logging for distributed storage systems. ACM Transactions on Storage, 16(2), 1–20.

6. Shekhar, P. C. (2019). Agile vs. Waterfall: A Comprehensive Analysis of Software Testing Methodo.

7. Wang, L., Zhao, J., & Xu, H. (2020). Blockchain microtransaction framework for secure IoT device coordination. International Journal of Distributed Sensor Networks, 16(4), 155014771989976.

8. Li, F., Wang, T., & Chen, Y. (2020). Lightweight hybrid blockchain architecture for secure V2X communication. Proceedings of ACM MobiCom Workshop on Blockchain in Mobile Communications.

9. Devaraju, Sudheer. " Optimizing Data Transformation in Workday Studio for Global Retailers Using Rule-Based Automation."Journal of Emerging Technologies and Innovative Research 7 (4), 69 – 74

10. Sugumar, R. (2016). An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data. Indian Journal of Science and Technology 9 (48):1-5.

11. Ahmed, R., Malik, A., & Khan, S. (2020). Distributed blockchain based event logging for anomaly detection in software-defined networking. IEEE Journal on Selected Areas in Communications, 38(5), 1018–1030.

Downloads

Published

2021-01-05

How to Cite

Blockchain Applications in Network Security and Secure Transactions. (2021). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 4(1), 4227-4231. https://doi.org/10.15662/IJARCST.2021.0401001