Block chain-based access control protocol in Internet of Drones

被引:2
作者
Perumalla S. [1 ]
Chatterjee S. [2 ]
Kumar A.P.S. [1 ]
机构
[1] JNTU Ananthpur, Andhra Pradesh, Ananthpuramu
[2] Research Center Imarat DRDO, Hyderabad
关键词
access control; authentication; blockchain network; encryption; Internet of Drones;
D O I
10.1080/1206212X.2021.1961366
中图分类号
学科分类号
摘要
The Internet of Drones (IoD) is an emerging domain due to its capability of being deployed in several domains. The drones in IoD are capable of exploring the platform and transfer commodities with embedded sensors. However, the data accumulated by drone sensors face privacy and security issues due to advanced technologies. This paper devises a blockchain-based access control scheme for initiating secure communication among the drones in IoD. The system has four different entities that involve the Drone, server, user, and control room. The proposed Blockchain-based access control scheme involves two phases: the authentication and access control phases. The authentication phase is performed considering sender drone credentials, and the access control phase is done using four methods. In the access control phase, four kinds of access control mechanisms are considered: Drone to drone access control, Drone to server access control, Emergency access control if drone failure and Control set up with blockchain technology. Both the communicating entities can establish the secret key for secure communication at the end of access control. The proposed Blockchain-based access control scheme provided superior performance concerning classical methods with a minimal end-to-end delay of 0.870sec, a minimal packet loss rate of 2%, and maximal throughput of 70.493bps. © 2021 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:847 / 862
页数:15
相关论文
共 50 条
  • [41] SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
    El-Zawawy, Mohamed A.
    Brighente, Alessandro
    Conti, Mauro
    COMPUTER NETWORKS, 2022, 206
  • [42] A Study on Hash Chain-based Hadoop Security Scheme
    Jung, Young-Ae
    Woo, Si-Jae
    Yeo, Sang-Soo
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1831 - 1835
  • [43] A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles
    Zheng, Jihu
    Duan, Haixin
    Wang, Chenyu
    Cao, Qiang
    Xu, Guoai
    Fang, Rui
    ELECTRONICS, 2024, 13 (10)
  • [44] Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities
    Pal, Shantanu
    Jadidi, Zahra
    SENSORS, 2021, 21 (20)
  • [45] Multi-department data sharing access control scheme on block chain
    Jiang J.
    Zhang X.
    Deng H.
    Wang J.
    Huang H.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2022, 28 (10): : 3202 - 3211
  • [46] Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones
    Chaudhary, Dharminder
    Lee, Cheng-Chi
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 120
  • [47] An efficient oblivious transfer protocol with access control
    Liao, Yaqing
    Zhou, Jing
    Yang, Yang
    Ruan, Ou
    2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 29 - 34
  • [48] Enhanced authentication and access control in Internet of Things: a potential blockchain-based method
    Muzammal, Syeda Mariam
    Murugesan, Raja Kumar
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (5-6) : 469 - 485
  • [49] An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
    Naijian Zhang
    Qi Jiang
    Long Li
    Xindi Ma
    Jianfeng Ma
    Peer-to-Peer Networking and Applications, 2021, 14 : 3319 - 3332
  • [50] An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
    Zhang, Naijian
    Jiang, Qi
    Li, Long
    Ma, Xindi
    Ma, Jianfeng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3319 - 3332