Academic Journal of Agricultural Sciences, 2023, 4(1); doi: 10.38007/AJAS.2023.040109.
Varun Verma
The University of Sydney Business School, Australia
In recent years, mobile communication technology has developed by leaps and bounds. With the passage of time, its privacy issues for people have gradually been exposed, and the security of mobile communication technology has become a topic of public concern. This article mainly studies whether Blockchain technology has reliable security for mobile communication. For the issues that everyone is concerned about, this article uses the method of combining blockchain technology and mobile communication technology to first encrypt mobile communication information, and then encrypts the information stored in the mobile system, so that the two technologies are completely consistent.In the 4 groups of experiments, when the blockchain is the same, its initial output effect always starts from 0. With the increase of time, the output efficiency also increases gradually. The fourth group is more obvious, and then the other groups gradually slow down . Unlike the other blockchains mentioned above, it is found through experiments that the blockchain technology described in this article can solve the trust problem well, and has the advantages of timely, accurate and systematic data for the blockchain. Mobile communication technology has been able to Better to present more secure technology. This can not only make the communication information safe, but also better protect privacy, and make the blockchain better serve the public.
Blockchain Technology, Mobile Communication Terminal, Secure Communication, Information Encryption, Information Storage
Varun Verma. Secure Communication Scheme of Mobile Communication Terminal Based on Blockchain Technology. Academic Journal of Agricultural Sciences (2023), Vol. 4, Issue 1: 108-121. https://doi.org/10.38007/AJAS.2023.040109.
[1] Meng W , Tischhauser E , Wang Q , et al. When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access, 2018, 6(1):10179-10188.
[2] Pieter H. Hartel, Nanna Suryana Herman. Information Security. cyber safety an introduction, 2017, 64(5):472–473.
[3] Kearney W D , Kruger H A . Theorising on risk homeostasis in the context of information security behaviour. Information and Computer Security, 2016, 24(5):496-513.
[4] Choi, JunWon, Kim. Authentication and payment system and method using mobile communication terminal. archives of ophthalmology, 2018, 117(6):733-5.
[5] Yermack D . Corporate Governance and Blockchains. Review of Finance, 2017, 21(1):7-31.
[6] Mengelkamp E , Notheisen B , Beer C , et al. A blockchain-based smart grid: towards sustainable local energy markets. Computer Science Research & Development, 2018, 33(1-2):207-214.
[7] Bahga A , Madisetti V K . Blockchain Platform for Industrial Internet of Things. Journal of Software Engineering and Applications, 2016, 09(10):533-546.
[8] Ramadhani, Erika, Luthfi, Ahmad. A Study: Enhancing Security of Anonymity Communication on the World Wide Web. advanced science letters, 2018, 24(1):616-620.
[9] Han KH, Bae W S . Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices. Cluster Computing, 2016, 19(4):1-7.
[10] Funk E , Riddell J , Ankel F , et al. Blockchain Technology: A Data Framework to Improve Validity, Trust, and Accountability of Information Exchange in Health Professions Education. Academic Medicine, 2018, 93(12):1.
[11] Weizhi Meng, Elmar Tischhauser, Qingju Wang. When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access, 2018, 6(1):10179-10188.
[12] Pieters G C , Koch C . Blockchain Technology Disrupting Traditional Records Systems. Economic review (Federal Reserve Bank of Dallas), 2017, 6(2):1-3.
[13] HARA HITOSHI. mobile communication terminal with ic tag reader. psyche, 2017, 21(9):606.
[14] He D , Chan S , Qiao Y , et al. Imminent Communication Security for Smart Communities. IEEE Communications Magazine, 2018, 56(1):99-103.
[15] Katharine Gammon. Experimenting with blockchain: Can one technology boost both data integrity and patients' pocketbooks?. Nature Medicine, 2018, 24(4):378-381.
[16] Othman S . Securing Robotic Communication using Multiple Security Techniques. International Journal of Computer Applications, 2017, 178(1):1-4.
[17] He D , Chan S , Qiao Y , et al. Imminent Communication Security for Smart Communities. IEEE Communications Magazine, 2018, 56(1):99-103.
[18] Clark S . Library Security: Better Communication, Safer Facilities. reference & user services quarterly, 2016, 55(3):245.
[19] Panda D , Molla K A , Baig M J , et al. DNA as a digital information storage device: hope or hype?. 3 Biotech, 2018, 8(5):239.
[20] Nan Wang, Wei Liang, Yanan Cheng. Battery Energy Storage System Information Modeling Based on IEC 61850. journal of power & energy engineering, 2016, 02(4):233-238.
[21] Hiroyuki T . Information Processing Apparatus,Information Processing Method, Machine Readable Storage Medium Storing Control Information of Information Processing Apparatus, and Image Processing Apparatus. Review of Laser Engineering, 2018, 15(5):637-651.