Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

被引:71
|
作者
Bera, Basudeb [1 ]
Das, Ashok Kumar [1 ]
Sutrala, Anil Kumar [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[2] CA Technol, Hyderabad 500032, Telangana, India
关键词
Internet of drones (IoD); UAV detection and mitigation; Access control; Blockchain; Security; AVISPA; USER AUTHENTICATION SCHEME; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; MUTUAL AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; SECURE; SURVEILLANCE; CHALLENGES; 5G;
D O I
10.1016/j.comcom.2020.12.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or even damage the network reliability that can have direct impact on drones control. This may lead to a potential threat for people, governments, and business sectors. To deal with these issues, in this paper, we propose a novel access control scheme for unauthorized UAV detection and mitigation in an Internet of Drones (IoD) environment, called ACSUD-IoD. With the help of the blockchain-based solution incorporated in ACSUD-IoD, the transactional data having both the normal secure data from a drone (UAV) to the Ground Station Server (GSS) and the abnormal (suspected) data for detection of unauthorized UAVs by the GSS are stored in private blockchain, that are authentic and genuine. As a result, the Big data analytics can be performed on the authenticated transactional data stored in the blockchain. Through the detailed security analysis including formal security under the broadly-accepted Real-Or-Random (ROR) model, formal security verification using the widely-applied Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and non-mathematical security analysis show the robustness of the proposed scheme against a number of potential attacks needed in an IoD environment. The testbed experiments for various cryptographic primitives using the broadly-accepted Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) have been performed under both server and Raspberry PI 3 configurations. Furthermore, a detailed comparative analysis among the proposed scheme and other existing competing schemes shows the efficacy and more robustness as compared to the existing schemes. Finally, the blockchain-based practical demonstration shows the effectiveness of the proposed scheme.
引用
下载
收藏
页码:91 / 109
页数:19
相关论文
共 50 条
  • [1] A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control
    Shi, Jinshan
    Li, Ru
    Hou, Wenhan
    IEEE ACCESS, 2020, 8 : 156027 - 156042
  • [2] Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach
    Javaid, Uzair
    Jameel, Furqan
    Javaid, Umair
    Khan, Muhammad Toaha Raza
    Jantti, Riku
    MOBILE INFORMATION SYSTEMS, 2020, 2020 (2020)
  • [3] Blockchain-Based Searchable Encryption Access Control Mechanism for the Internet of Things
    Li, Mengyuan
    Guo, Shaoyong
    Li, Wengjing
    Xiong, Ao
    Wang, Dong
    Li, Da
    Qi, Feng
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 258 - 268
  • [4] A Walkthrough of Blockchain-Based Internet of Drones Architectures
    Jain, Ayushi
    Barke, Shivam
    Garg, Mehak
    Gupta, Anvita
    Narwal, Bhawna
    Mohapatra, Amar Kumar
    Sharma, Deepak Kumar
    Srivastava, Gautam
    IEEE Internet of Things Journal, 2024, 11 (21) : 34924 - 34940
  • [5] Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
    Bera, Basudeb
    Chattaraj, Durbadal
    Das, Ashok Kumar
    COMPUTER COMMUNICATIONS, 2020, 153 : 229 - 249
  • [6] Blockchain-Based Access Control for the Internet of Things: A Survey
    Abdulrahman, Ebtihal
    Alshehri, Suhair
    Cherif, Asma
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [7] Detection and Blockchain-Based Collaborative Mitigation of Internet of Things Botnets
    Sajjad, Syed Muhammad
    Mufti, Muhammad Rafiq
    Yousaf, Muhammad
    Aslam, Waqar
    Alshahrani, Reem
    Nemri, Nadhem
    Afzal, Humaira
    Khan, Muhammad Asghar
    Chen, Chien-Ming
    Wireless Communications and Mobile Computing, 2022, 2022
  • [8] Blockchain-based access control mechanism for data traceability
    Xie R.
    Li H.
    Shi G.
    Guo Y.
    Zhang M.
    Dong X.
    Shi, Guozhen (sgz1974@163.com), 1600, Editorial Board of Journal on Communications (41): : 82 - 93
  • [9] Blockchain-based Access Control Mechanism for Big Data
    Liu A.-D.
    Du X.-H.
    Wang N.
    Li S.-Z.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (09): : 2636 - 2654
  • [10] Blockchain-Based Social Network Access Control Mechanism
    Dai, Minjun
    Li, Yongsheng
    Wen, Yong
    Liu, Dongyu
    Chen, Honglin
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 : 147 - 164