Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

被引:2
|
作者
Mishra, Amit Kumar [1 ,2 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [3 ]
Singh, Jaskaran [1 ]
Vasilakos, Athanasios V. [4 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Univ Agder UiA, Ctr AI Res CAIR, N-4879 Grimstad, Norway
关键词
Internet of Drones (IoD); unmanned aerial vehicles (UAVs); cyber-attacks; blockchain; data analytics; security; USER AUTHENTICATION; INTERNET; SCHEME; MECHANISM; EXCHANGE; PROTOCOL; DESIGN; IOD;
D O I
10.3390/drones7080508
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of creative responses to a variety of challenges. The Internet of Drones (IoD) is a relatively new concept that has arisen as a consequence of the combination of drones and the Internet. The fifth-generation (5G) and beyond cellular networks (i.e., drones in networks beyond 5G) are promising solutions for achieving safe drone operations and applications. They may have many applications, like surveillance or urban areas, security, surveillance, retaliation, delivering items, smart farming, film production, capturing nature videos, and many more. Due to the fact that it is susceptible to a wide variety of cyber-attacks, there are certain concerns regarding the privacy and security of IoD communications. In this paper, a secure blockchain-enabled authentication key management framework with the big data analytics feature for drones in networks beyond 5G applications is proposed (in short, SBBDA-IoD). The security of SBBDA-IoD against multiple attacks is demonstrated through a detailed security analysis. The Scyther tool is used to perform a formal security verification test on the SBBDA-IoD's security, confirming the system's resistance to various potential attacks. A detailed comparative analysis has identified that SBBDA-IoD outperforms the other schemes by a significant margin. Finally, a real-world implementation of SBBDA-IoD is shown to evaluate its effect on several measures of performance.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Braeken, An
    Liyanage, Madhusanka
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1324 - 1331
  • [22] Blockchain-Enabled Multi-Operator Small Cell Network for Beyond 5G Systems
    Okon, Asuquo
    Jagannath, Nishant
    Elgendi, Ibrahim
    Elmirghani, Jaafar M. H.
    Jamalipour, Abbas
    Munasinghe, Kumudu
    IEEE NETWORK, 2020, 34 (05): : 171 - 177
  • [23] Blockchain-Enabled Secure Collaborative Model Learning Using Differential Privacy for IoT-Based Big Data Analytics
    Tekchandani, Prakash
    Bisht, Abhishek
    Das, Ashok Kumar
    Kumar, Neeraj
    Karuppiah, Marimuthu
    Vijayakumar, Pandi
    Park, Youngho
    IEEE TRANSACTIONS ON BIG DATA, 2025, 11 (01) : 141 - 156
  • [24] Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network
    Gong, Seonghyeon
    El Azzaoui, Abir
    Cha, Jeonghun
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2020, 10 (02):
  • [25] Big Data Enabled Mobile Network Design for 5G and Beyond
    Han, Shuangfeng
    I, Chih-Lin
    Li, Gang
    Wang, Sen
    Sun, Qi
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (09) : 150 - 157
  • [26] Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
    Jangirala, Srinivas
    Das, Ashok Kumar
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7081 - 7093
  • [27] URL filtering using big data analytics in 5G networks
    Khan, Nasir Ali
    Khan, Abid
    Ahmad, Mansoor
    Shah, Munam Ali
    Jeon, Gwanggil
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [28] Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing
    Wijethilaka, Shalitha
    Yadav, Awaneesh Kumar
    Braeken, An
    Liyanage, Madhusanka
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 3988 - 4005
  • [29] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [30] Formal Analysis of 5G Authentication and Key Management for Applications (AKMA)
    Yang, Tengshun
    Wang, Shuling
    Zhan, Bohua
    Zhan, Naijun
    Li, Jinghui
    Xiang, Shuangqing
    Xiang, Zhan
    Mao, Bifei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 126