A blockchain authentication scheme for UAV-aided fog computing

被引:0
|
作者
Xiaoyu Du
Song Tao
Ke Yuan
Yinyin Li
Yi Zhou
机构
[1] Henan University,School of Computer and Information Engineering
[2] Henan University,Henan Engineering Laboratory of Spatial Information Processing
[3] Henan University,School of Artificial Intelligence Henan University
来源
关键词
UAV; Blockchain; Fognode; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Unmanned Aerial Vehicle (UAV) swarms not only expanded the application areas of UAVs but also brought more complex challenges to security. Both the data collected by UAVs and UAVs themselves are easy targets for hackers. Once a hacker has intercepted communication information or hijacked a UAV, it can cause the disclosure of information and even affect the normal flight of the UAV. In terms of authentication, existing research focuses on building peer-to-peer networks through devices that support blockchain deployments at the edge nodes to form blockchain networks. UAVs cannot run blockchains directly, so fog nodes need to be introduced to assist UAVs in achieving authentication. This paper proposes a UAV authentication solution based on the fog node-assisted blockchain. The solution incorporates smart contracts to ensure trust, along with on-chain registration and authentication for UAVs. In the design of this paper, the main use is made of fog nodes at the edge of each block. The fog nodes serve as agents to register and authenticate the UAVs in their area on the blockchain, thus enabling the authentication of UAVs in different fog node areas. In this paper, the analysis of gas consumption yields a total economic benefit cost of about ¥\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\yen $$\end{document} 12.77, which is negligible for the safety of the UAVs. Meanwhile, the paper compares the computational overheads, and within 10 UAVs, the computational overhead of this scheme is less than 50 ms, which is significantly lower than the other two schemes.
引用
收藏
页码:1689 / 1702
页数:13
相关论文
共 50 条
  • [31] Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication
    Al-Mekhlafi, Zeyad Ghaleb
    Al-Janabi, Hussam Dheaa Kamel
    Al-Shareeda, Mahmood A.
    Mohammed, Badiea Abdulkarem
    Alshudukhi, Jalawi Sulaiman
    Al-Dhlan, Kawther A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 3703 - 3721
  • [32] Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain
    Umoren, Otuekong
    Singh, Raman
    Pervez, Zeeshan
    Dahal, Keshav
    SENSORS, 2022, 22 (10)
  • [33] Blockchain-Based Secure Authentication with Improved Performance for Fog Computing
    Umoren, Otuekong
    Singh, Raman
    Awan, Shahid
    Pervez, Zeeshan
    Dahal, Keshav
    SENSORS, 2022, 22 (22)
  • [34] Intelligent and efficient Metaverse rendering and caching in UAV-aided vehicular edge computing
    Yuan, Linlin
    Wu, Guoquan
    Jin, Kebing
    Li, Ya
    Tang, Jianhang
    Li, Shaobo
    VEHICULAR COMMUNICATIONS, 2025, 53
  • [35] Task Offloading in UAV-Aided Edge Computing: Bit Allocation and Trajectory Optimization
    Xiong, Jingyu
    Guo, Hongzhi
    Liu, Jiajia
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (03) : 538 - 541
  • [36] Agent-enabled task offloading in UAV-aided mobile edge computing
    Wang, Rui
    Cao, Yong
    Noor, Adeeb
    Alamoudi, Thamer A.
    Nour, Redhwan
    COMPUTER COMMUNICATIONS, 2020, 149 : 324 - 331
  • [37] UAV-Aided Relative Localization of Terminals
    Liu, Yuanpeng
    Wang, Yunlong
    Shen, Xiao
    Wang, Jian
    Shen, Yuan
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12999 - 13013
  • [38] The Optimal Trajectory Planning for UAV in UAV-aided Networks
    Wang, Quan
    Chang, Xiangmao
    CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT II, 2016, 10040 : 192 - 204
  • [39] Design of anonymous authentication scheme for vehicle fog services using blockchain
    Xinrui Duan
    Yajun Guo
    Yimin Guo
    Wireless Networks, 2024, 30 : 193 - 207
  • [40] Design of anonymous authentication scheme for vehicle fog services using blockchain
    Duan, Xinrui
    Guo, Yajun
    Guo, Yimin
    WIRELESS NETWORKS, 2024, 30 (01) : 193 - 207