4.8 Article

Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 8, Pages 6406-6415

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3015382

Keywords

Drones; Authentication; Smart cities; Internet of Things; Computer architecture; Authentication; blockchain; decentralized authentication; drone security; drones; Internet of Things (IoT)

Ask authors/readers for more resources

This article introduces a secure authentication model utilizing blockchain technology to address security and latency issues in drone authentication in smart cities. The proposed architecture aims for positive impacts on the Internet of Drones (IoD) by reducing network latency and enhancing security.
There is currently widespread use of drones and drone technology due to their rising applications that have come into fruition in the military, safety surveillance, agriculture, smart transportation, shipping, and delivery of packages in our Internet-of-Things global landscape. However, there are security-specific challenges with the authentication of drones while airborne. The current authentication approaches, in most drone-based applications, are subject to latency issues in real time with security vulnerabilities for attacks. To address such issues, we introduce a secure authentication model with low latency for drones in smart cities that looks to leverage blockchain technology. We apply a zone-based architecture in a network of drones, and use a customized decentralized consensus, known as drone-based delegated proof of stake (DDPOS), for drones among zones in a smart city that does not require reauthentication. The proposed architecture aims for positive impacts on increased security and reduced latency on the Internet of Drones (IoD). Moreover, we provide an empirical analysis of the proposed architecture compared to other peer models previously proposed for IoD to demonstrate its performance and security authentication capability. The experimental results clearly show that not only does the proposed architecture have low packet loss rate, high throughput, and low end-to-end delay in comparison to peer models but also can detect 97.5% of attacks by malicious drones while airborne.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available