Blockchain-enabled Secure Data Communication Protocols for 5G Networks
Received: 14 November 2024 | Revised: 5 December 2024 | Accepted: 22 December 2024 | Online: 2 February 2025
Corresponding author: Mohanad Sameer Jabar
Abstract
With the further expansion of 5G networks, a main priority continues to shift towards secure and efficient protocols for data transmission. Traditional 5G security mechanisms, such as 3GPP AKA protocols, have limitations in scalability, latency, and resilience against cyber threats, making them quite unsuitable for complex high-density 5G environments. This study proposes a Secure Blockchain-based Data Transmission Protocol (SBDTP) with the decentralized and tamper-resistant feature of blockchain, combined with a hybrid consensus mechanism driven by Proof of Stake (PoS) or Practical Byzantine Fault Tolerance (PBFT). In this respect, this study contributes to state-of-the-art research efforts in the field of enhancing data integrity, authentication, and confidentiality with reduced latency and energy consumption in 5G applications. Extensive simulations showed that SBDTP outperformed previous solutions by a large margin. This protocol reduces latency to 50-80 ms, increases throughput to 900 pps, allows up to 1000 nodes without performance degradation, and reduces energy consumption to 0.8 J per node. It also maintains a very close-to-perfection data integrity check rate of ~100% and a very minimal privacy loss rate of less than 1%, showing strong security that could serve well for real-time 5G applications such as IoT networks, autonomous vehicles, and smart cities. These results show that SBDTP offers an efficient and secure solution for data transmission over 5G networks, outperforming traditional and blockchain-based methods while fulfilling the tight requirements posed by next-generation networks. In the future, the protocol should be optimized for scalability, including further advanced privacy techniques to widen its adaptability to diverse 5G applications.
Keywords:
5G security, blockchain, data transmission protocol, networks, computer scienceDownloads
References
A. Rahman et al., "Internet of medical things and blockchain-enabled patient-centric agent through SDN for remote patient monitoring in 5G network," Scientific Reports, vol. 14, no. 1, Mar. 2024, Art. no. 5297.
A. Rahman et al., "BlockSD-5GNet: Enhancing security of 5G network through blockchain-SDN with ML-based bandwidth prediction," Transactions on Emerging Telecommunications Technologies, vol. 35, no. 4, 2024, Art. no. e4965.
D. Balakumar and S. Nandakumar, "Blockchain-enabled cooperative spectrum sensing in 5G and B5G cognitive radio via massive multiple-input multiple-output nonorthogonal multiple access," Results in Engineering, vol. 24, Dec. 2024, Art. no. 102840.
N. M. S. E. Saeed, A. Ibrahim, L. Ali, N. A. Al-Dmour, A. S. Mohammed, and T. M. Ghazal, "Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review," in 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, Feb. 2024, pp. 1–7.
S. Q. Salih, R. Sekhar, J. F. Tawfeq, A. Ibrahim, P. Shah, and A. D. Radhi, "Integrated Digital Signature Based Watermarking Technology for Securing Online Electronic Documents," Fusion: Practice and Applications, no. 1, pp. 120–128, Jan. 2024.
A. Ibrahim, R. Sekhar, J. F. Tawfeq, S. Q. Salih, P. Shah, and A. D. Radhi, "Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques," Journal of Intelligent Systems and Internet of Things, no. Issue 1, pp. 21–28, Jan. 2024.
A. Ibrahim et al., "Usability Evaluation of Kids’ Learning Apps," in 2023 International Conference on Business Analytics for Technology and Security (ICBATS), Dubai, United Arab Emirates, Mar. 2023, pp. 1–10.
B. Desai, K. Patil, I. Mehta, and A. Patil, "A secure communication framework for smart city infrastructure leveraging encryption, intrusion detection, and blockchain technology," Advances in Computer Sciences, vol. 7, no. 1, 2024.
D. Das, U. Ghosh, N. Evans, and S. Shetty, "Blockchain-Enabled Secure Device-to-Device Communication in Software-Defined Networking," in 2024 IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA, Jun. 2024, pp. 1450–1455.
T. Liu et al., "Blockchain and Trusted Hardware-Enabled Data Scheduling for Edge Learning in Wireless IIoT," IEEE Internet of Things Journal, vol. 11, no. 21, pp. 34229–34242, Aug. 2024.
I. S. Alkhalifa and A. S. Almogren, "Enhancing Security and Scalability in Vehicular Networks: A Bayesian DAG Blockchain Approach With Edge-Assisted RSU," IEEE Access, vol. 12, pp. 116558–116571, 2024.
P. Chinnasamy, G. C. Babu, R. K. Ayyasamy, S. Amutha, K. Sinha, and A. Balaram, "Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques," Sensors, vol. 24, no. 18, Jan. 2024, Art. no. 6143.
I. A. Barazanchi et al., "WBAN System Organization, Network Performance and Access Control: A Review," in 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey, Oct. 2021, pp. 1–6.
I. Al Barazanchi, W. Hashim, A. A. Alkahtani, H. H. Abbas, and H. R. Abdulshaheed, "Overview of WBAN from Literature Survey to Application Implementation," in 2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Semarang, Indonesia, Oct. 2021, pp. 16–21.
D. M. H. Almuntifeky and B. K. J. Al-shammari, "Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks," Wasit Journal of Engineering Sciences, vol. 12, no. 3, pp. 33–43, Aug. 2024.
S. Gnanavel, N. Arunachalam, and G. W. Sathianesan, "Blockchain for Smart Vehicular Communications," in Blockchain Technology in the Automotive Industry, CRC Press, 2024.
M. Kokila and K. Srinivasa Reddy, "BlockDLO: Blockchain Computing With Deep Learning Orchestration for Secure Data Communication in IoT Environment," IEEE Access, vol. 12, pp. 134521–134540, 2024.
R. Al-Amri, R. K. Murugesan, E. M. Alshari, and H. S. Alhadawi, "Toward a Full Exploitation of IoT in Smart Cities: A Review of IoT Anomaly Detection Techniques," in Proceedings of International Conference on Emerging Technologies and Intelligent Systems, 2022, pp. 193–214.
S. Q. Salih and A. A. Alsewari, "A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer," Neural Computing and Applications, vol. 32, no. 14, pp. 10359–10386, Jul. 2020.
Q. H. Alsultan et al., "Innovative Composite Materials for Improving Structural Integrity and Longevity in Civil Engineering Applications," KHWARIZMIA, vol. 2023, pp. 63–72, Jun. 2023.
M. A. Burhanuddin, "Secure and Scalable Quantum Cryptographic Algorithms for Next-Generation Computer Networks," KHWARIZMIA, vol. 2023, pp. 95–102, Jul. 2023.
Downloads
How to Cite
License
Copyright (c) 2025 Mohanad Sameer Jabar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.