4.3 Article

BUAV: A Blockchain Based Secure UAV-Assisted Data Acquisition Scheme in Internet of Things

Journal

JOURNAL OF COMMUNICATIONS AND NETWORKS
Volume 21, Issue 5, Pages 491-502

Publisher

KOREAN INST COMMUNICATIONS SCIENCES (K I C S)
DOI: 10.1109/JCN.2019.000050

Keywords

Blockchain; Internet of things; MEC; security; unmanned aerial vehicle

Funding

  1. MSIT (Ministry of Science, ICT), Korea, under the ITRC (Information Technology Research Center) support program [IITP-2019-2014-1-00639]
  2. National Research Foundation of Korea (NRF) - Korea government (MSIT) [2019R1A2C1089542]
  3. Priority Research Centers Program through the National Research Foundation of Korea (NRF) - Ministry of Education, Science and Technology [2018R1A6A1A03024003]
  4. National Research Foundation of Korea [22A20152313375] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

Internet of things (IoT), mobile edge computing (MEC), and unmanned aerial vehicle (UAV) have attracted significant attention in both industry and academic research. By consolidating these technologies, IoT can be facilitated with improved connectivity, better data transmission, energy saving, and other advantages. However, the communication between these entities is subject to potential cyber threats. In addition, the integrity of the data must be maintained after storing into local storage. Blockchain is a data structure that supports features like pseudonymity, data integrity etc. This paper represents a blockchain based data acquisition process in which information is gathered from IoTs using UAV as a relay and is securely kept in blockchain at MEC server. In the proposed scheme, data are encrypted prior to transfer to MEC server with the assistance of a UAV. Upon receiving the data, MEC server validates the data and the identity of the sender. Successful validation is followed by stocking of the data into blockchain, subsequent to obtaining consent from the validators. Security analysis is conducted in order to show the feasibility of the proposed secure scheme. Finally, the performance of the proposed scheme is analyzed via simulation and implementation.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available