Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

被引:71
|
作者
Bera, Basudeb [1 ]
Das, Ashok Kumar [1 ]
Sutrala, Anil Kumar [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[2] CA Technol, Hyderabad 500032, Telangana, India
关键词
Internet of drones (IoD); UAV detection and mitigation; Access control; Blockchain; Security; AVISPA; USER AUTHENTICATION SCHEME; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; MUTUAL AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; SECURE; SURVEILLANCE; CHALLENGES; 5G;
D O I
10.1016/j.comcom.2020.12.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or even damage the network reliability that can have direct impact on drones control. This may lead to a potential threat for people, governments, and business sectors. To deal with these issues, in this paper, we propose a novel access control scheme for unauthorized UAV detection and mitigation in an Internet of Drones (IoD) environment, called ACSUD-IoD. With the help of the blockchain-based solution incorporated in ACSUD-IoD, the transactional data having both the normal secure data from a drone (UAV) to the Ground Station Server (GSS) and the abnormal (suspected) data for detection of unauthorized UAVs by the GSS are stored in private blockchain, that are authentic and genuine. As a result, the Big data analytics can be performed on the authenticated transactional data stored in the blockchain. Through the detailed security analysis including formal security under the broadly-accepted Real-Or-Random (ROR) model, formal security verification using the widely-applied Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and non-mathematical security analysis show the robustness of the proposed scheme against a number of potential attacks needed in an IoD environment. The testbed experiments for various cryptographic primitives using the broadly-accepted Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) have been performed under both server and Raspberry PI 3 configurations. Furthermore, a detailed comparative analysis among the proposed scheme and other existing competing schemes shows the efficacy and more robustness as compared to the existing schemes. Finally, the blockchain-based practical demonstration shows the effectiveness of the proposed scheme.
引用
下载
收藏
页码:91 / 109
页数:19
相关论文
共 50 条
  • [41] Blockchain-Based, Decentralized Access Control for IPFS
    Steichen, Mathis
    Fiz, Beltran
    Norvill, Robert
    Shbair, Wazen
    State, Radu
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1499 - 1506
  • [42] Hyperledger Fabric Access Control System for Internet of Things Layer in Blockchain-Based Applications
    Iftekhar, Adnan
    Cui, Xiaohui
    Tao, Qi
    Zheng, Chengliang
    ENTROPY, 2021, 23 (08)
  • [43] Blockchain-Based Privacy Access Control Mechanism and Collaborative Analysis for Medical Images
    Prasad, Puja Sahay
    Beena Bethel, G N
    Singh, Ninni
    Kumar Gunjan, Vinit
    Basir, Samar
    Miah, Shahajan
    Security and Communication Networks, 2022, 2022
  • [44] A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things
    Hao, Xiaohan
    Ren, Wei
    Fei, Yangyang
    Zhu, Tianqing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 773 - 786
  • [45] A blockchain-based access control and intrusion detection framework for satellite communication systems
    Cao, Sheng
    Dang, Sixuan
    Zhang, Yuan
    Wang, Wei
    Cheng, Nan
    COMPUTER COMMUNICATIONS, 2021, 172 : 216 - 225
  • [46] Reputation Evaluation Using Fuzzy Logic for Blockchain-Based Access Control in an IoT Environment
    Alqbaishi, Arwa A.
    Ahmed, Alaa E. S.
    IEEE ACCESS, 2024, 12 : 97386 - 97404
  • [47] Blockchain-based access control with k $k$-times tamper resistance in cloud environment
    Zheng, Wenying
    Lai, Chin-Feng
    Chen, Bing
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) : 7787 - 7811
  • [48] BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones
    Qiao, Gongzhe
    Zhuang, Yi
    Ye, Tong
    Qiao, Yuan
    DRONES, 2023, 7 (05)
  • [49] Latency Estimation of Blockchain-Based Distributed Access Control for Cyber Infrastructure in the IoT Environment
    Halgamuge, Malka N.
    PROCEEDINGS OF THE 2021 IEEE 16TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2021), 2021, : 510 - 515
  • [50] UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones
    Allouch, Azza
    Cheikhrouhou, Omar
    Koubaa, Anis
    Toumi, Khalifa
    Khalgui, Mohamed
    Nguyen Gia, Tuan
    SENSORS, 2021, 21 (09)