4.7 Article

Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

期刊

COMPUTER COMMUNICATIONS
卷 166, 期 -, 页码 91-109

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2020.12.005

关键词

Internet of drones (IoD); UAV detection and mitigation; Access control; Blockchain; Security; AVISPA

资金

  1. Mathematical Research Impact Centric Support (MATRICS) - Science and Engineering Research Board (SERB) , India [MTR/2019/000699]
  2. Ripple Centre of Excellence Scheme, CoE in Blockchain, IIIT Hyderabad, India [IIIT/R&D Office/Internal Projects/001/2019]

向作者/读者索取更多资源

In this paper, a novel access control scheme for unauthorized UAV detection and mitigation, called ACSUD-IoD, is proposed. By incorporating a blockchain-based solution in ACSUD-IoD, the data from drones can be securely stored for detection of unauthorized UAVs, and Big data analytics can be performed on the authenticated transactional data stored in the blockchain to ensure data authenticity and effectiveness. The detailed security analysis and testbed experiments demonstrate the robustness and efficacy of the proposed scheme in an IoD environment compared to existing schemes.
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or even damage the network reliability that can have direct impact on drones control. This may lead to a potential threat for people, governments, and business sectors. To deal with these issues, in this paper, we propose a novel access control scheme for unauthorized UAV detection and mitigation in an Internet of Drones (IoD) environment, called ACSUD-IoD. With the help of the blockchain-based solution incorporated in ACSUD-IoD, the transactional data having both the normal secure data from a drone (UAV) to the Ground Station Server (GSS) and the abnormal (suspected) data for detection of unauthorized UAVs by the GSS are stored in private blockchain, that are authentic and genuine. As a result, the Big data analytics can be performed on the authenticated transactional data stored in the blockchain. Through the detailed security analysis including formal security under the broadly-accepted Real-Or-Random (ROR) model, formal security verification using the widely-applied Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and non-mathematical security analysis show the robustness of the proposed scheme against a number of potential attacks needed in an IoD environment. The testbed experiments for various cryptographic primitives using the broadly-accepted Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) have been performed under both server and Raspberry PI 3 configurations. Furthermore, a detailed comparative analysis among the proposed scheme and other existing competing schemes shows the efficacy and more robustness as compared to the existing schemes. Finally, the blockchain-based practical demonstration shows the effectiveness of the proposed scheme.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据