1 Introduction

The advent of 5G and Beyond 5G technologies provides faster speeds and improved reliability. Usage of the Internet has seen phenomenal growth with the implementations of these technologies. Communication engineering has been exploring its high technical intelligence to cover the entire applications, namely 5G and B5G. The world witnesses massive changes, for the benefit of humans, in the name of information services and IoT, courtesy these technologies. The Technology, IOT which connect all appliances with wireless (CAW) has introduced the change in the whole scenario of the society, fetch everything in its place in a jiffy. This technology helps in presenting smartness everywhere to meet the futuristic requirements of All Time Connectivity (ATC) with the amplest capacity and extensive coverage. But, with the heterogeneity of IoT devices, the vulnerability in data security and non-availability of the central controller, communication among IoT devices in the network face more significant challenges. These new generation networks shall have to find solutions to all sort of problems in communication with an assured security level, guaranteed bandwidth and no latency (Table 1).

Table 1 Stimulation Parameters Values

The solution for the issues could be achieved by involving novel multi-skilling techniques to a common platform and integrate with advance technologies. We have to propose an architecture that ensures data security and availability of the central controller. Over the years, peer to peer networking has crafted an exact network configuration by offering shared network nodes with equal responsibilities without a central server to share the files in both directions. The association of blockchain technology with peer to peer network still deeply entrench the security level of the P2P network, making it the most popular and trusted network for sharing the critical files. In such a scenario, we have to provide a network connecting IoT devices. We propose to use a P2P system for communication and data sharing and blockchain technology for security. The member nodes in Peer-to-peer architecture (P2P architecture) share their contribution and responsibilities during file transmission at any state without centralized server in the network. Moreover, it helps reduce bandwidth issues and communication delays. Further, it avoids a single point of network failures. Distributed nature of this network reduces the cost of data transmission among peer nodes, increases the data transmission rate and lessens the loading capacity of nodes. The work process happens simultaneously in the network that allows us to reduce a load of each peer when several peers are involved. Further, there will be a reduced impact on the system when some peers move away from the network. One disadvantage is that it does not have a centralized server.

A sound security system has to exhibit the three essential characteristics, namely availability of resources when needed, confidentiality- only authorized access the data and integrity. Blockchain technology provides all the required features. P2P provides distributed connectivity. To provide the central controller for the network, we delve into the concept of Software Defined Network (SDN). There are two essential components in SDN, namely controller and switch. As SDN separates the data plane from the control plane, we propose to use the SDN as a central controller.

The blockchain-enabled P2P network offers completely decentralized verification, validation and updating of transactions. It ensures autonomy, concealment of data, with consensus mechanism and immutability. Despite the newer strategies provided by the blockchain-enabled P2P network, it is vulnerable to frequent attacks. Sibyl attack is one among them. It happens when an attacker possesses many nodes, and he could easily compromise the system when he achieves a majority. Thus, it poses a threat in the public blockchain. Hence, to further strengthen the data security and meet the challenges, a new cut in edge technique is required to enhance the security level of the network. This paper explores various existing approaches to improve the security level of Blockchain-enabled P2Petwork, and it proposes a new technique that enhances the security system without third party intervention in communication. This significant improvement in data security will allow the use of the system for more applications in B5G technology.

New threats are largely evolving, and data hacking is still driven mainly by the intrusion of malicious nodes. The continuous effort of passive attackers to steal the information of the nodes are always a challenge and reduce the efficacy of the network. Mainly the blockchain technology makes a favourable impression in situations that required employing most reliable tight cybersecurity systems for data transmissions. New P2P networks support confidentiality and privacy.

The importance of this work is to come up with a most secured system that shows resilience against all possible attacks like Sybil attack, selfish mining, DNS Attack, DOS attack, Consensus delay and double-spending attacks. Selfish mining is a dishonest attempt to compromise the integrity of the network. Typically, all these attacks are due to the admission of new nodes without proper examination / no measures to find out their troths of pseudonymous of the nodes/failure to identify intruder nodes. Although the technologies are emerging to weed out some of these problems, still secure communication suffers from the attack of intellectual hackers who uses better ideas than anti hackers.

Blockchain Technology

In general, security in peer to peer network needs improvement considering the decentralized architecture and the distributed protocols-dependent services. Some entities need secured data transfer; we need advance protection to data from threats. Blockchain technology implemented using P2P network provides accountability and validation of the nodes. This technology overcomes the MITM attack and EFAIL attack in electronic messaging and maintains the track records of complete transactions [1]. Initially, the purpose behind blockchain was to create the time records of the digital documents; it ensured that the documents could not be malformed. It is difficult to alter the data by meddling in-network since the validation process takes time because of the action happens in individual networks. Developing new applications using blockchain possesses new menaces like scalability, possible breach of privacy etc. These impediments need proper solutions [2].

Generally, the blockchain architecture consists of the infrastructure layer, platform layer, distributed computing layer, and application layer [3]. Infrastructure layer consists of storage facilities, simple nodes, mining nodes and full nodes, and network facilities. Platform layer helps the clients to access the application developed on top of a blockchain network. Platform layer assists Remote Procedure Calls [4], Web API [5], and Representational State Transfer (REST) API. Distributed computing layer guarantees fault tolerance, accessing data locally, privacy-preserving, immutability, authenticity, and security for the transaction data. Immutability ensures tamper-proof of stored record in the ledger and updates it with consensus agreement; miner ensures new block generation. Also, the encryption technique provides user authentication [6], and the hashing technique provides data privacy [7]. Introduction of smart devices within the distributed computing layer offers privacy protection and energy security [8]. The application layer provides a digital asset transaction and smart contract execution. Blockchain is a critical technology in 6G applications which helps spectrum sharing [9] and terrestrial communication [10].

1.1 Aim of the research

To develop a new secure data transmission method between heterogenous IoT devices for an existing blockchain-enabled architecture for IoT devices. This network uses an SDN Controller. The proposed method would provide a secure method for transfer-of-files and its data.

The Paper organisation is given as under: Section 2gives a detailed account of the related works happened. In Section 3we define the problem. Section 4 provides proposed mechanism for secure transmission of transfer of files and its data between nodes of IoT networksSection 5 talks about results and discussion. Section 6 provides conclusion.

2 Related works

In related works, we analyze existing research papers that explore the Internet of Things, software-defined networks and blockchain and the integration of these technologies, their usefulness and challenges. The advantage is that the distributed nature of architecture and security services provided by this network extends its use in all sort of financial transactions.

The blockchain technology provides security and immutability. It needs implementation using a programming language. It allows agreement between nodes and ensures the trust of using the underlying platform. The programming practices of implementing blockchain related to different domains and platforms, related security issues are emphasized by the authors R. M. Parizi et al. [11] in their paper. The authors of [12] and [13] illustrated the uses of blockchain technology in intelligent accountings, e-government and medical data gatherings. In [14], the researches contributed an empirical evaluation of open-source automatic security analysis tools for the security vulnerability detection of Ethereum smart contracts written in Solidity. In the research paper [15], the authors suggested the utilization of blockchain for cybersecurity applications. The references [16, 17] described the details of the chain of blocks in the blockchain, how it records the details of transactions carried out and uses that for secure P2P network management without the help of intermediaries. S. Huh et al. [18] used Ethereum based blockchain to build the IoT configuration. In their research, the author did not consider the memory of the IoT devices to keep the records of the whole chain. In another paper [19], A. Dorri et al. elucidates the development of IoT applications using a developed blockchain, where clustered architecture is involved in minimizing the delay and other issues.

Abbas Yazdinejad et al. [20] proposed a novel Blockchain-enabled Packet Parser (BPP) architecture that depends on the features used in security. They employed a multivariate correlation approach on the packets in traffic to detect the attack. The authors Reza M. Parizi et al. [21] addressed Privacy Enhancing Techniques - Enabled with Side-chain (PETES) using Garlic Routing and Onion Routing (GOR) framework in blockchain structure. Abbas Yazdinejad [22] illustrated an SDN architecture using public and private blockchains enabled in P2P network communication for IoT applications. This document suggested a new routing protocol with a clustered structure to increase energy efficiency.

Intruders intrude in the stream of working architecture with a fake identity and try to grasp the data or damage the data in the regular-stream. Authentication is an essential tool to trust the devices/ nodes which sink/source the data from the protected set of network architecture. IoT research promoters advocate various valuable novel ideas for authentication to increase the security level of the complete architecture and defend it from destructive actions. SanazKavianpour et al. [23] reviewed the different authentication approaches to secure the IoT security and discussed the problems and opportunities of each approach. J. Wang et al. [24]. Suggested a blockchain for edge empowered smart grid using a mutual authentication protocol. L. Xiong et al. [25] introduced a new authentication method to enhance privacy in-network.

J. Wan et al. [26] recommended a decentralized blockchain structure for industrial IoT applications and the authors Z. Lu et al. of [27] contributed a privacy maintaining authentication framework. The authors L. Li et al. [28] initiated another privacy maintaining technique for credit coin application. Day by day, attackers follow new tactics to attack the network, which deteriorate the nature of the system and to reduce its importance. So the purpose of the design of the new architecture of the network will not be solved, and the designers try to introduce new anti-attacking strategies/ strengthen the securities in the network. Many authors concentrated their attention on network security. They initiated the research to maintain the privacy management architecture using blockchain M. U. Hassan et al. [29] proposed a privacy maintaining technique in mobile networks and services, particularly for 5G IoT systems.

Exploits the advantages of blockchain technology in access control mechanisms of resources, makes it very efficient in IoT and other applications. In this direction, the authors M. Ma et al. [30], S. Ding et al. [31], Z. Liu et al. [32] and M. Yang et al. [33] conducted their research and proposed their individual blockchain-based access control techniques. These expedited the study on the blockchain and invigorated the attention of scientist to find out more application using blockchain with P2P networks. Blockchain provides distributed ledger and decentralized resource allocation. Hence it is an appropriate technology for communication networks to solve the key issues and provide better solutions. Blockchain helps to maintain reliable resource allocation for video transcoding and delivery, as suggested by the author Y. Liu et al. [34], and for the purpose of efficient spectrum management by the researchers M. B. Weiss et al. [35]. Dynamic spectrum access using blockchain technology was described btK.Kotobi and S. G. Bilen [36].

Data transmission, Data storage and Data sharing are essential processes in IoT networks. Here, security challenges, data centre cost management and less complexity in computations are the bottlenecks. W. Liang et al. [37], contributed their work to propose a secure data transmission technique and C. H. Liu et al. [38] suggested a secure data collection technique for Industrial IoTs using blockchain. D. Li et al. [39] encouraged the blockchain decentralized architecture to secure data storage, and K. Fan et al. [40] discussed the blockchain-based data sharing techniques. Moreover, new methods to handle the problems of delay due to procrastination in auditing was addressed by Y. Zhang et al. [41] and they proposed a solution for cloud storage using blockchain.

The authors Aakanksha Tewari and B.B. Gupta [42], proposed an authentication method based on ECC mechanism involving RF ID tags for IoT applications. The novelty of this work is producing the new public and private key pseudo random number generator and ECE for every session. The authors proved security of RF ID authentication protocol used in this work through security analysis. The blockchain technology has been known for its robustness in securing the system. We have public and private blockchain. The blockchain is decentralised P2P networks. Online purchasers use to refer to the Reputation evaluation system. Typically, the system uses a third party to manage such systems. The use of the third party risks the privacy of the users. Haoxuan Li, et al [43] addressed the issue of privacy, blockchain stores the evaluation information instead of the third party. The consistent technological improvements in communication and the use of newer technologies with gaps endanger security while transmitting data. It is all the more relevant in securing IoT where we need to protect connected heterogeneous devices in the network. Christos Stergiou et al. [44] introduces one novel system which integrates IoT with cloud computing. It presents a new architecture wherein it places a security wall between the internet and the cloud which takes care of all the security issues. The cloud now takes care of the privacy issues.

Despite the usefulness of IoT, it is vulnerable to online attacks. To strengthen the IoT with due consideration to it having the limited resources, Aakanksha Tewari, *B. B. Gupta [45] investigate the security issues in all three layers of IoT and crosslayer heterogeneous integration issues. Researchers in [46] use new technique to handle the fairness. This technique controls the infidelity of transaction among the Leechers and improves the fairness; also solve the free-riding problems. Preserving user’s anonymity has inherent difficulty in P2P networks, which is unstructured. Many solutions offered were in similar lines as given to the client-server method, which is structured. Authors A. Naghizadeh et al. [47] presents structural-based tunnelling (SBT) to provide anonymity for the peer to peer circular networks. The newly incorporated chords to SBT help manage designs for the applications. The disadvantage in this method is that there is a trade-off between performance and security. Authors Alireza Naghizadeh et al. in [48], propose a tunnelling method to offer receiver’s anonymity in circular P2P architectures. This mechanism provides higher security by preserve the identity of receivers. Optimising the size of the tunnel reduces the routing cost.

3 Problem definition

The essential characteristics of blockchain-like distributed nature, secure communication and no intermediaries allow the Blockchain-enabled Peer to Peer network to be the right choice for Beyond-5G communication. Blockchain-enabled P2P network satisfies the anticipation of users in primary potential services like an intelligent way of managing security issues, processing the data and efficiently handling the resources. Among all these possible primary services, this work concentrates on secure services, discusses the challenges and suggests a new secure transmission for this network. Nodes in the blockchain-enabled networks perform similar kinds of work. While adding new blocks in the network, the blockchain protocols direct all nodes in the network to verify the node’s information based on a cryptographic technique that ensures the immutability of information. The primary existence in the blockchain architecture is the distributed computing layer, in which the role of consensus protocols in the consensus sub-layer is an essential layer behind all Ethereum, Hyperledger, or any other blockchain. Ethereum and Bitcoin are some of the examples of permissionless blockchain. Here one can use probabilistic consensus. At the same time, Hyper ledger and fabric are permissioned-blockchains that employ deterministic consensus. The duty of consensus protocol is authenticating the blocks, ordering the blocks and ensuring the concordance of all other nodes. Proper authentication strategies introduce intensified screening methods to validate the block and eliminate the probable risks to enhance the security service. Consensus protocols (algorithms) make a particular set of indentures among nodes in the network, synchronize the nodes, ensure all nodes agreed to the truth, and ensure the confirmation that all transactions validations are as per the rule.

4 Proposed mechanism

The specific objective is to provide an elevated secure mechanism for data transferring between the users in a blockchain-enabled network. This work selected an existing cluster architecture, using peer to peer network-enabled by blockchain-based SDN controllers to execute and validate the proposed secure. The clustered architecture comprises of many SDN domains, in which, each cluster domain is connected to another using a public blockchain (P2P network between SDN Controllers. All SDN domains connect to cloud storage. In each SDN domain, each cluster head is an SDN controller. It is linked to one private blockchain. The IoT devices are connected to SDN Controllers. Network management is through IoT- based-blockchain. This network has private block chain in SDN Domain. The network shall have heterogeneous IoT devices are heterogeneous. The P2P network that connects the controller provides the security of the data.

This work concentrates on these points and intends topoint out a perfect method able to face chaotic situations using a new authentication strategy to validate the blocks in theblockchain-enabled P2P network. The organized structure of blockchain-enabled network shown in Fig. 1 always shows efficiency in its operation. The SDN controller is a cluster head coordinates the entire cluster, and this structure uses private and public blockchains. As it is a cluster structure, the public blockchain-enabled between the controllers in P2P keeps ledger at the small number and adds secure communication. New SDN domain can join in this structure by generating a new block and avail completed transactions of the particular controller. But private blockchain-enabled between the nodes and controllers requires validation as per paradigm set by the network. Figure 1 explains the new enhanced authentication method for file transfer through the SDN controller using a private and public key. While transferring data files from user A to B, the particular operation is signed by A. It will be published with the public key and Public-key value-based signature generated with the private key of the transaction. This is sent to the whole network; Nodes authenticate this operation based on Public key value-based signature generated with the private key. Now only the users know the value-based signature can decode the data from the File. The value-based signature approach is preventing the entire transaction from the attacks and malfunctioning of the data transfer operation. The encoding and decoding algorithms used in the above data transaction is given below to recognize the procedure in detail.

Fig. 1
figure 1

File Transfer Technique through SDN controller using private and public key

Figure 2 states the encoding and decoding flow of source A, SDN, destination B at the initiator end and the receiver end.

Fig. 2
figure 2

Encoding and Decoding flow of source A, SDN, destination B

4.1 Encoding and decoding flow

4.1.1 File Signature and Encodeby A

  • A wants to transfer its File to B

  • Generate identity A (IDA, NA) and B (IDB, NB)

  • Then Compute Hash value the PWA = h (NA || NB)

  • T1 is support value is calculated by T1 = IDA ⊕ NB

  • Public key value based signature generated SAA = h (T1|| PWA) ⊕ IDB

  • Private Key based Encoding EF = Enc(F,PK)

  • Finally add the Public key based signature in the encoded file using

SAEnc = ESDN (IDB, NB, SAA, T1,EF).

4.1.2 SDN Block chain

  • A sends SAEncthat are received from A to SDN.

  • Generate identity of block chain IDSDN, NSDN

  • Support value is calculated T2 = IDSDN ⊕ NA

  • Assign the encoded file to the blocks using SDNEnc = SAEnc

  • Add Authentication to the SDN SBSDN = E (T2, IDB, NB)

4.1.3 File Signature verifies and Decode by B

  • After receiving the message, B first decrypts SɃSDN = D (SBSDN) to reveal SɃSDN, SDNEn, T2.

  • Then calculate T2 = T1 ⊕ NB and SAA = h (T2 || PWA) ⊕ IDB), Then SAA checks whether SBFA = SBFAIf they are equal, File is decode otherwise not

  • The file is decoded using private key S = D (SDNEnc)

4.2 Encoding and decoding algorithms

Algirithm 1: Encoding.

figure a

Algorithm 1 is a description of the blockchain-based data Encoding and Signature generation. The process sequence for proposed blockchain P2P networks as follows:

  1. Step1

    : Compute the Hash value

    • First check the identity of the source and destination NA ≠ NB if there is equal terminate the combination otherwise Compute the values PWA, T1, SAA.

  2. Step2

    : Encoding and Signature generation

    • Check the condition End of Packet (EOP) if it is true to do encoding and signature generation process.

    • Source A generate the data and send to the destination B

    • Source A encrypts the diagnosis data F into cryptograms using the private key PK1.

    • The F cryptograms the analysis data from the ring signature as SAEnc. It can be taken as a pattern to check the same data kept twice in blockchain storage. The SAEnc sends the series of data to the blockchain network.

  3. Step3

    : SDN Blockchain.

The analysis data from the Source A along with SAEnc of the files are then sent to the blockchain network Add one more signature for the blockchain using T2, SBSDN to be data are stored in an SDN.

Algorithm 2 is a portrayal of the entire blockchain-based data Signature verifies and decode. The process of blockchain decoding and verification of P2P networks as follows:

Algorithm 2: Signature verifies and decode.

figure b
  1. Step1

    : XOR

  • Check the condition SBSDN ≠ EOP if it is true XOR the SBSDN and separate the all values using SDN get (SDNEn, T2, NB) otherwise stop the decoding process of B

  1. Step2

    : Verify signature and Decode

  • First, calculate verifying signature generation using T3 = T2 ⊕ NB

  • Check the identity of SDN authentication using T2 == T3 if there is not equal terminate the combination otherwise Compute the values S, SRA, get the S from SAA.

Check the identity of B authenticated using SRA

  • == SAA if there is not equal terminate the destination otherwise access the decoding packet and set the certification to the B is authentication using SCB, SC.

4.3 Analytical evaluation of the proposed method

This part talks about the analytical evaluation. It helps to analyse and estimate the performance based on parameters namely Throughput, Time overhead. Latency and bandwidth. For this we use queuing model M/H/2/1.

Let λi, be Packet arrival rate at the ith device, The arriving rate λ follows the poison distribution.

Let μ represent the service rate. It follows the exponential distribution.

Arrival rate given value = λi at the ith node,

Arrival time given value = 1/ λi.

Service rate given value = μ,

Service time given value = 1/ μ.

The incorrect packets reaching the SDN controller ρ = λ/ μ < 1, to find probability of n packets in the system, when n = 0, p(0) = idle rate = 1-(λ/ μ),

n = 1, p(1) = ρxp(0) = (λ/ μ) [1-(λ/ μ)].

p(n) = (λ/ μ)n [1-(λ/ μ)], gives the probability of n packets in the system.

Average number of packets in the system (Ls) = utilisation rate /idle rate = λ/ (μ- λ).

Average number of packets in the Queue (Lq) = [λ/ (μ- λ)] = [λ/ μ] Ls.

Average waiting time for a packet in the system Ws = 1/ (μ- λ).

Average waiting time for a packet in the queue Wq = (λ/ μ) 1/ (μ- λ) = (λ/ μ) Ws.

The expected length of the non-empty queue = Lq’ = Lq/p(n > 1) = μ/ (μ- λ), Where ρ = λ/ μ < 1.

By little law, expected time for an IoT device to process the packets = 1/ (μ- λ).

5 Results and discussions

This study carried out a systematic evaluation to verify the performance metrics like throughput, end to end delay, latency, Time overhead and response time to prove the pieces of evidence of the proposed research. This work used the Pyethereum tester tool under the Ethereum platform to execute and test the public and private blockchains. This work also has evaluated routing and compared with familiar routing protocols. For simulation purpose, this study employs six open daylight SDN controllers with 90 nodes using the random waypoint mobility model and simulation runs for 100 s.

5.1 Performance evaluation

Here we provide the details of implementation, the environment under which we test the proposed method. The metrics for evaluation of the results are immutability, throughput and time overhead, bandwidth and latency, response time and an end to end delay. To implement the Software-Defined Network (SDN), We used wifi simulator EstiNet network simulatortogether with the open-source controller pox. Each node on the EstiNet represents a process. It allows many applications to run on it. This method is applied in cluster architecture using SDN controller as a cluster head and executed, tested using Pyethereum tester tool (for implementing blockchain) under the Ethereum platform. The controller which contains blockchain, connects to cloud. The system uses Blockchain-Fundamental (BCF) to compare the performance. BCF uses hashing algorithm. Further it uses proof of work. These are some of the overheads.

We implement private and public blockchain and test them and do our evaluation using Pyethereum. Simulation of data sharing, transmitting of document files in the integrated environment of SDN and blockchain is done. With the help of Pyethereum tester tool installed in a virtual machine and EstiNet, we create different SDN networks with different IP addresses. We used open-daylight protocol. For simulation purpose, this study employs six open daylight SDN controllers with 90 nodes using the random waypoint mobility model and simulation runs for 100 s.

5.2 Evaluation metrics

5.2.1 Immutability

There is no possibility to tamper the block in this blockchain and provides better immutability. Many attempts have been taken, and the network has been given considerable importance to immutability due to the new type of cryptography with blockchain hashing process used in this network. While transferring the data between the nodes, the sender signs the particular operation and the system publishes it with the public key; it generates a peer Public key value-based signature with the private key of the transaction.

5.2.2 Throughput and time over head

In the network, the IoT devices request for transaction among themselves. The number of such transaction in a network is the throughput time. Figure 3 shows the comparison of throughput by this process and BCF method. In this verification, several transaction requests up to 1800 are recorded, and it displays a better result. Even while enhancing the security level, this work did not compromise with the throughput. Each node in the blockchain-enabled to peer network using SDN controller gets support for a better transaction through this process. As a continuation of this result discussion, this paper discusses the time overhead also. From Fig. 3, one could notice the development in throughput at every set of transaction. Figure 4 shows the comparisons of time overhead with the BCF method. The result shows that there is no much change in the time overhead; even a small difference is there in milliseconds.

Fig. 3
figure 3

Throughput-comparison

Fig. 4
figure 4

Time overhead

5.2.3 Bandwidth and latency

After including the proposed authentication method, the bandwidth and latency in the file transfer are evaluated and plotted in Figs. 5 and 6, respectively. As noted earlier, this simulation follows the random waypoint mobility model for assessing random paths used for file transfer. Through this work, the bandwidth and latency are less compared with the BCF method. There is no much difference in the latency of data transfer between using this process and the BCF method. The noteworthy point is, after authenticating this operation based on Public key value-based signature generated with the private key, the latency in data transfer is comparable with the BCF method. Regarding bandwidth, after 2500 data packets, there will be a reduction in bandwidth as the SDN controller choose the most efficient paths for the data transfer.

Fig. 5
figure 5

Bandwidth requirements

Fig. 6
figure 6

Latency of data transmission

5.2.4 Response time and end to end delay

Figures 7 and 8 reveals the metrics like response time and an end to end delay of the network on data transfer from one node to another node. This fast response reduces energy consumption and increases the performance of this network. This structure takes almost a little bit lesser response time even after introducing a new security strategy to validate the blocks. Figure 8 compares the end-to-end delay of this network with those familiar network routing protocols like AODV, DSDV, AOMDV, SMSN and EESCFD [22].

Fig. 7
figure 7

Comparison of Response time

Fig. 8
figure 8

Comparison of end-to-end delay

6 Conclusion

Today, we face extreme challenges in terms of preserving privacy, data security and integrity with the ever-increasing usage of IoT devices and demand for smart services. Addressing these issues should be the immediate priority of the researchers. To address this issue, we presented a new authentication method to validate the block in the blockchain-enabled peer to peer network with SDN controller. This method is applied in cluster architecture using SDN controller as a cluster head and executed, tested using Pyethereum tester tool under the Ethereum platform. The inclusion of the validation strategy makes our proposed method doing far better when compared to the existing method like BCF, and existing DSDV, SMSN, AODV concerning the metrics like throughput, end to end delay, latency, Time overhead and response time.

The new strategy provides the solution to the growing challenges in the security of data transfer in IoT and financial applications. As a future process, we plan to reinforce the dynamic biometric signals in this new validation strategy; will be applied to the high-level architecture to enable the transaction more secure through the service of a blockchain-enabled peer to peer network.