4.3 Article

BUAV: A Blockchain Based Secure UAV-Assisted Data Acquisition Scheme in Internet of Things

期刊

JOURNAL OF COMMUNICATIONS AND NETWORKS
卷 21, 期 5, 页码 491-502

出版社

KOREAN INST COMMUNICATIONS SCIENCES (K I C S)
DOI: 10.1109/JCN.2019.000050

关键词

Blockchain; Internet of things; MEC; security; unmanned aerial vehicle

资金

  1. MSIT (Ministry of Science, ICT), Korea, under the ITRC (Information Technology Research Center) support program [IITP-2019-2014-1-00639]
  2. National Research Foundation of Korea (NRF) - Korea government (MSIT) [2019R1A2C1089542]
  3. Priority Research Centers Program through the National Research Foundation of Korea (NRF) - Ministry of Education, Science and Technology [2018R1A6A1A03024003]
  4. National Research Foundation of Korea [22A20152313375] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

向作者/读者索取更多资源

Internet of things (IoT), mobile edge computing (MEC), and unmanned aerial vehicle (UAV) have attracted significant attention in both industry and academic research. By consolidating these technologies, IoT can be facilitated with improved connectivity, better data transmission, energy saving, and other advantages. However, the communication between these entities is subject to potential cyber threats. In addition, the integrity of the data must be maintained after storing into local storage. Blockchain is a data structure that supports features like pseudonymity, data integrity etc. This paper represents a blockchain based data acquisition process in which information is gathered from IoTs using UAV as a relay and is securely kept in blockchain at MEC server. In the proposed scheme, data are encrypted prior to transfer to MEC server with the assistance of a UAV. Upon receiving the data, MEC server validates the data and the identity of the sender. Successful validation is followed by stocking of the data into blockchain, subsequent to obtaining consent from the validators. Security analysis is conducted in order to show the feasibility of the proposed secure scheme. Finally, the performance of the proposed scheme is analyzed via simulation and implementation.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据