Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

被引:80
|
作者
Bera, Basudeb [1 ]
Das, Ashok Kumar [1 ]
Sutrala, Anil Kumar [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[2] CA Technol, Hyderabad 500032, Telangana, India
关键词
Internet of drones (IoD); UAV detection and mitigation; Access control; Blockchain; Security; AVISPA; USER AUTHENTICATION SCHEME; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; MUTUAL AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; SECURE; SURVEILLANCE; CHALLENGES; 5G;
D O I
10.1016/j.comcom.2020.12.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or even damage the network reliability that can have direct impact on drones control. This may lead to a potential threat for people, governments, and business sectors. To deal with these issues, in this paper, we propose a novel access control scheme for unauthorized UAV detection and mitigation in an Internet of Drones (IoD) environment, called ACSUD-IoD. With the help of the blockchain-based solution incorporated in ACSUD-IoD, the transactional data having both the normal secure data from a drone (UAV) to the Ground Station Server (GSS) and the abnormal (suspected) data for detection of unauthorized UAVs by the GSS are stored in private blockchain, that are authentic and genuine. As a result, the Big data analytics can be performed on the authenticated transactional data stored in the blockchain. Through the detailed security analysis including formal security under the broadly-accepted Real-Or-Random (ROR) model, formal security verification using the widely-applied Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and non-mathematical security analysis show the robustness of the proposed scheme against a number of potential attacks needed in an IoD environment. The testbed experiments for various cryptographic primitives using the broadly-accepted Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) have been performed under both server and Raspberry PI 3 configurations. Furthermore, a detailed comparative analysis among the proposed scheme and other existing competing schemes shows the efficacy and more robustness as compared to the existing schemes. Finally, the blockchain-based practical demonstration shows the effectiveness of the proposed scheme.
引用
收藏
页码:91 / 109
页数:19
相关论文
共 50 条
  • [21] Blockchain-based dynamic trust access control game mechanism
    Deng, Xianhui
    Li, Binyong
    Zhang, Shaowei
    Deng, Liangming
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (02) : 702 - 725
  • [22] LBAC: A lightweight blockchain-based access control scheme for the internet of things
    Qin, Xuanmei
    Huang, Yongfeng
    Yang, Zhen
    Li, Xing
    INFORMATION SCIENCES, 2021, 554 : 222 - 235
  • [23] Cost-Efficient Blockchain-Based Access Control for the Internet of Things
    Wiraatmaja, Christopher
    Zhang, Yuanyu
    Sasabe, Masahiro
    Kasahara, Shoji
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [24] BIoAC: A blockchain-based secure access control management for the Internet of Things
    Roy, Utsa
    Ghosh, Nirnay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87
  • [25] BacS: A blockchain-based access control scheme in distributed internet of things
    Shi, Na
    Tan, Liang
    Yang, Ciaxia
    He, Chen
    Xu, Junli
    Lu, Yang
    Xu, Hao
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2585 - 2599
  • [26] Blockchain-Based Access Control Model for Security Attributes in the Internet of Things
    Yan, Xincheng
    Wu, Jianhua
    Zhou, Na
    Jiang, Zhihong
    Wu, Juqin
    Yin, Jianhui
    Liu, Ying
    2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 95 - 101
  • [27] BorderChain: Blockchain-Based Access Control Framework for the Internet of Things Endpoint
    Oktian, Yustus Eko
    Lee, Sang-Gon
    IEEE ACCESS, 2021, 9 : 3592 - 3615
  • [28] BacS: A blockchain-based access control scheme in distributed internet of things
    Na Shi
    Liang Tan
    Ciaxia Yang
    Chen He
    Junli Xu
    Yang Lu
    Hao Xu
    Peer-to-Peer Networking and Applications, 2021, 14 : 2585 - 2599
  • [29] Blockchain-based entity access control scheme for ubiquitous UAV swarm tasks
    Xie, Hui
    He, Teng
    Wei, Shengjun
    Hu, Changzhen
    COMPUTING, 2025, 107 (01)
  • [30] A systematic review on blockchain-based access control systems in cloud environment
    Punia, Aarti
    Gulia, Preeti
    Gill, Nasib Singh
    Ibeke, Ebuka
    Iwendi, Celestine
    Shukla, Piyush Kumar
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):