Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3555661.3560861acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks

Published: 24 October 2022 Publication History

Abstract

While 5G can provide high-speed Internet connectivity and over-the-horizon control for Unmanned Aerial Vehicles (UAVs), authentication becomes a key security component in 5G-enabled UAVs. This is due to fact that the communicating entities in the network mostly uses unsecured communication channel to exchange critical surveillance data. Authentication thus plays a crucial role in the 5G-enabled UAV network, providing a range of security services such as credential privacy, Session-Key (SK) security, and secure mutual authentication. However, transparency, anonymity, traceability and centralized control are few major security requirements that cannot be fulfilled by the traditional authentication schemes. One of the upcoming technologies that can provide a solution for present centralized 5G-enabled UAV network is blockchain-based authentication scheme. Motivated from aforementioned discussion, this paper presents a Permissioned Blockchain empowered Secure Authentication and Key Agreement framework in 5G-enabled UAVs. In this framework, first an authentication phase between UAV-to-UAV, UAV-to-Edge Server (ES) and Edge-to-Cloud Server (CS) supporting mutual authentication and key agreement is proposed. The authenticated surveillance data collected from UAV is used by the peer-to-peer CS for transaction verification, block creation and addition using smart contract-based consensus mechanism. The practical implementation of framework shows the effectiveness of the proposed approach.

References

[1]
Ahamed Aljuhani. 2021. Machine learning approaches for combating distributed denial of service attacks in modern networking environments. IEEE Access 9 (2021), 42236--42264.
[2]
Moayad Aloqaily, Ouns Bouachir, Azzedine Boukerche, and Ismaeel Al Ridhawi. 2021. Design guidelines for blockchain-assisted 5G-UAV networks. IEEE network 35, 1 (2021), 64--71.
[3]
Basudeb Bera, Anusha Vangala, Ashok Kumar Das, Pascal Lorenz, and Muhammad Khurram Khan. 2022. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Computer Standards & Interfaces 80 (2022), 103567.
[4]
Ran Canetti and Hugo Krawczyk. 2002. Universally composable notions of key exchange and secure channels. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 337--351.
[5]
Ashok Kumar Das, Basudeb Bera, Sourav Saha, Neeraj Kumar, Ilsun You, and Han-Chieh Chao. 2021. AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems. IEEE Internet of Things Journal 9, 9 (2021), 6374--6388.
[6]
Danny Dolev and Andrew Yao. 1983. On the security of public key protocols. IEEE Transactions on information theory 29, 2 (1983), 198--208.
[7]
Srinivas Jangirala, Ashok Kumar Das, and Athanasios V Vasilakos. 2019. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Transactions on Industrial Informatics 16, 11 (2019), 7081--7093.
[8]
Teng Li, Jianfeng Ma, Qingqi Pei, Chengyan Ma, Dawei Wei, and Cong Sun. 2019. Privacy-preserving verification and root-cause tracing towards UAV social networks. In ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, 1--6.
[9]
Ishan Mistry, Sudeep Tanwar, Sudhanshu Tyagi, and Neeraj Kumar. 2020. Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges. Mechanical systems and signal processing 135 (2020), 106382.
[10]
Syed Ahsan Raza Naqvi, Syed Ali Hassan, Haris Pervaiz, and Qiang Ni. 2018. Drone-aided communication as a key enabler for 5G and resilient public safety networks. IEEE Communications Magazine 56, 1 (2018), 36--42.
[11]
Tarun Rana, Achyut Shankar, Mohd Kamran Sultan, Rizwan Patan, and Balamurugan Balusamy. 2019. An intelligent approach for UAV and drone privacy security using blockchain methodology. In 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 162--167.
[12]
Anusha Vangala, Anil Kumar Sutrala, Ashok Kumar Das, and Minho Jo. 2021. Smart contract-based blockchain-envisioned authentication scheme for smart farming. IEEE Internet of Things Journal 8, 13 (2021), 10792--10806.
[13]
Jian Wang, Yongxin Liu, Shuteng Niu, Houbing Song, Weipeng Jing, and Jiawei Yuan. 2021. Blockchain enabled verification for cellular-connected unmanned aircraft system networking. Future Generation Computer Systems 123 (2021), 233--244.
[14]
Abbas Yazdinejad, Reza M Parizi, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2019. Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Transactions on Network Science and Engineering 8, 2 (2019), 1120--1132.

Cited By

View all
  • (2024)Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security ChallengesFuture Internet10.3390/fi1607025016:7(250)Online publication date: 13-Jul-2024
  • (2024)Blockchain-Based Authentication and Explainable AI for Securing Consumer IoT ApplicationsIEEE Transactions on Consumer Electronics10.1109/TCE.2023.332015770:1(1145-1154)Online publication date: Feb-2024
  • (2024)MU-BISE: Multi-UAV Collaborative Mapping based on Blockchain Information Security Enhancement2024 3rd International Conference on Robotics, Artificial Intelligence and Intelligent Control (RAIIC)10.1109/RAIIC61787.2024.10670766(241-244)Online publication date: 5-Jul-2024
  • Show More Cited By

Index Terms

  1. Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DroneCom '22: Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond
    October 2022
    138 pages
    ISBN:9781450395144
    DOI:10.1145/3555661
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 October 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. 5G
    2. authentication and key agreement
    3. blockchain
    4. unmanned aerial vehicles

    Qualifiers

    • Research-article

    Conference

    ACM MobiCom '22
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)120
    • Downloads (Last 6 weeks)16
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security ChallengesFuture Internet10.3390/fi1607025016:7(250)Online publication date: 13-Jul-2024
    • (2024)Blockchain-Based Authentication and Explainable AI for Securing Consumer IoT ApplicationsIEEE Transactions on Consumer Electronics10.1109/TCE.2023.332015770:1(1145-1154)Online publication date: Feb-2024
    • (2024)MU-BISE: Multi-UAV Collaborative Mapping based on Blockchain Information Security Enhancement2024 3rd International Conference on Robotics, Artificial Intelligence and Intelligent Control (RAIIC)10.1109/RAIIC61787.2024.10670766(241-244)Online publication date: 5-Jul-2024
    • (2024)Securing Agricultural Communications: Blockchain Integration in UAV Networks for Smart Farming2024 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCWorkshops59551.2024.10615542(1443-1449)Online publication date: 9-Jun-2024
    • (2024)Futuristic hospitality conceptualized: DASH - Decentralized Autonomous and Smart Hotel systemJournal of Open Innovation: Technology, Market, and Complexity10.1016/j.joitmc.2024.10022310:1(100223)Online publication date: Mar-2024
    • (2024)Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity frameworkFuture Generation Computer Systems10.1016/j.future.2024.02.015156(191-205)Online publication date: Jul-2024
    • (2024)A secure and efficient UAV network defense strategyComputer Standards & Interfaces10.1016/j.csi.2024.10384490:COnline publication date: 1-Aug-2024
    • (2024)Secured IoT architecture for personalized marketing using blockchain framework with deep learning technologyCluster Computing10.1007/s10586-024-04372-zOnline publication date: 16-May-2024
    • (2023)A Novel Model Based on Deep Learning Approach Combining Data Decomposition Technique and Grouping Distribution Strategy for Water Demand Forecasting of Urban UsersJournal of Circuits, Systems and Computers10.1142/S021812662450007533:01Online publication date: 27-Jun-2023
    • (2023)An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0Journal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.02.00935:3(103-119)Online publication date: 1-Mar-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media