Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

被引:80
|
作者
Bera, Basudeb [1 ]
Das, Ashok Kumar [1 ]
Sutrala, Anil Kumar [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[2] CA Technol, Hyderabad 500032, Telangana, India
关键词
Internet of drones (IoD); UAV detection and mitigation; Access control; Blockchain; Security; AVISPA; USER AUTHENTICATION SCHEME; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; MUTUAL AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; SECURE; SURVEILLANCE; CHALLENGES; 5G;
D O I
10.1016/j.comcom.2020.12.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or even damage the network reliability that can have direct impact on drones control. This may lead to a potential threat for people, governments, and business sectors. To deal with these issues, in this paper, we propose a novel access control scheme for unauthorized UAV detection and mitigation in an Internet of Drones (IoD) environment, called ACSUD-IoD. With the help of the blockchain-based solution incorporated in ACSUD-IoD, the transactional data having both the normal secure data from a drone (UAV) to the Ground Station Server (GSS) and the abnormal (suspected) data for detection of unauthorized UAVs by the GSS are stored in private blockchain, that are authentic and genuine. As a result, the Big data analytics can be performed on the authenticated transactional data stored in the blockchain. Through the detailed security analysis including formal security under the broadly-accepted Real-Or-Random (ROR) model, formal security verification using the widely-applied Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and non-mathematical security analysis show the robustness of the proposed scheme against a number of potential attacks needed in an IoD environment. The testbed experiments for various cryptographic primitives using the broadly-accepted Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) have been performed under both server and Raspberry PI 3 configurations. Furthermore, a detailed comparative analysis among the proposed scheme and other existing competing schemes shows the efficacy and more robustness as compared to the existing schemes. Finally, the blockchain-based practical demonstration shows the effectiveness of the proposed scheme.
引用
收藏
页码:91 / 109
页数:19
相关论文
共 50 条
  • [31] Blockchain-based Private Set Intersection Protocol with Attribute-based Access Control
    Wei, Song
    Ma, Limin
    He, Zeyu
    Zhang, Wei
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 576 - 581
  • [32] Blockchain-based access control for enterprise blockchain applications
    Xu, Lei
    Markus, Isaac
    Subhod, I
    Nayab, Nikhil
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2020, 30 (05)
  • [33] Blockchain-based Access Control Mechanism of Federated Data Sharing System
    Ding, Yan
    Feng, Liaoliao
    Qin, Ying
    Dong, Pan
    Huang, Chenlin
    Gao, Long
    Tan, Yusong
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 277 - 284
  • [34] Blockchain-Based Supply Chain Data Hierarchical Access Control Mechanism
    Ye, Jin
    Pang, Chengjie
    Li, Xiaohuan
    Zhang, Xin
    Liu, Liang
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2022, 51 (03): : 408 - 415
  • [35] SDACS: Blockchain-Based Secure and Dynamic Access Control Scheme for Internet of Things
    Gong, Qinghua
    Zhang, Jinnan
    Wei, Zheng
    Wang, Xinmin
    Zhang, Xia
    Yan, Xin
    Liu, Yang
    Dong, Liming
    SENSORS, 2024, 24 (07)
  • [36] Enhanced authentication and access control in Internet of Things: A potential blockchain-based method
    Muzammal S.M.
    Murugesan R.K.
    Murugesan, Raja Kumar (rajakumar.murugesan@taylors.edu.my), 1600, Inderscience Publishers (12): : 469 - 485
  • [37] Enhanced authentication and access control in Internet of Things: a potential blockchain-based method
    Muzammal, Syeda Mariam
    Murugesan, Raja Kumar
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (5-6) : 469 - 485
  • [38] A Blockchain-Based Access Control Framework for Secured Data Sharing in Industrial Internet
    Zhou, Wei
    Jin, Jiahui
    2020 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2020), 2020, : 231 - 236
  • [39] A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things
    Tian, Hongliang
    Tian, Junyuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 1297 - 1310
  • [40] Capability-Based Access Control for the Internet of Things: An Ethereum Blockchain-Based Scheme
    Nakamura, Yuta
    Zhang, Yuanyu
    Sasabe, Masahiro
    Kasahara, Shoji
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,