Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

被引:0
|
作者
Da, Lemei [1 ]
Liang, Hai [1 ]
Ding, Yong [1 ,2 ]
Wang, Yujue [1 ]
Yang, Changsong [1 ]
Wang, Huiyong [3 ]
机构
[1] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Pengcheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518055, Peoples R China
[3] Guilin Univ Elect Technol, Sch Math & Comp Sci, Guilin 541004, Peoples R China
来源
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Unmanned aerial vehicle cluster network; certificateless signcryption; certificateless signature; batch verification; source authentication; data privacy; blockchain; PRESERVING AUTHENTICATION SCHEME;
D O I
10.32604/cmes.2023.026309
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an aggregate unmanned aerial vehicle (AGV) that can batch-verify the acquisition reports within its administrative domain. After successful verification, AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage. There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports, respectively. The security analysis shows that the BDA construction can protect the privacy and authenticity of acquisition data, and effectively resist a malicious key generation center and the public-key substitution attack. It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem (ECDLP) assumption. The performance analysis demonstrates that compared with other schemes, the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity.
引用
收藏
页码:879 / 902
页数:24
相关论文
共 50 条
  • [41] Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things
    Goyat, Rekha
    Kumar, Gulshan
    Alazab, Mamoun
    Conti, Mauro
    Rai, Mritunjay Kumar
    Thomas, Reji
    Saha, Rahul
    Kim, Tai-Hoon
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 14203 - 14215
  • [42] A blockchain-based preserving and sharing system for medical data privacy
    Chen, Zeng
    Xu, Weidong
    Wang, Bingtao
    Yu, Hua
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 : 338 - 350
  • [43] Blockchain-based Intelligent Hospital Security and Data Privacy Construction
    Huang, Qiuzi
    Chen, Shuyu
    Zhao, Hui
    Wen, Junhao
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [44] Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
    Zhang, Lejun
    Peng, Minghui
    Su, Shen
    Wang, Weizheng
    Jin, Zilong
    Su, Yansen
    Chen, Huiling
    Guo, Ran
    Sergey, Gataullin
    [J]. CHINA COMMUNICATIONS, 2024, 21 (03) : 149 - 159
  • [45] Trusted Blockchain-based Data Fingerprinting Differential-Traceability and SkipList Indexing Methods in Privacy Protection
    Zhang, Jiazheng
    Bai, Fenhua
    Shen, Tao
    Gong, Bei
    Luo, Jianzhao
    [J]. PROCEEDINGS OF 2022 4TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2022, 2022, : 73 - 83
  • [46] Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
    Zhang Lejun
    Peng Minghui
    Su Shen
    Wang Weizheng
    Jin Zilong
    Su Yansen
    Chen Huiling
    Guo Ran
    Sergey Gataullin
    [J]. China Communications, 2024, 21 (03) : 149 - 159
  • [47] Privacy in Blockchain-based Smart Grids
    Bracciale, Lorenzo
    Raso, Emanuele
    Gallo, Pierluigi
    Sanseverino, Eleonora Riva
    Bianchi, Giuseppe
    Loreti, Pierpaolo
    [J]. 2022 WORKSHOP ON BLOCKCHAIN FOR RENEWABLES INTEGRATION (BLORIN), 2022, : 37 - 41
  • [48] Blockchain-Based Smart Advertising Network With Privacy-Preserving Accountability
    Liu, Dongxiao
    Huang, Cheng
    Ni, Jianbing
    Lin, Xiaodong
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2118 - 2130
  • [49] Yet Another Blockchain-based Privacy-friendly Social Network
    Jaatun, Lars Andreassen
    Ringen, Anders
    Jaatun, Martin Gilje
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2022), 2022, : 222 - 229
  • [50] Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network
    Ren, Yongjun
    Leng, Yan
    Zhu, Fujian
    Wang, Jin
    Kim, Hye-Jin
    [J]. SENSORS, 2019, 19 (10)