Blockchain-based entity access control scheme for ubiquitous UAV swarm tasks

被引:1
作者
Xie, Hui [2 ,3 ]
He, Teng [2 ,3 ]
Wei, Shengjun [1 ,2 ]
Hu, Changzhen [1 ,2 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing, Peoples R China
[2] Beijing Inst Technol, Beijing Key Lab Software Secur Engn Technol, Beijing, Peoples R China
[3] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
关键词
UAV swarm; Blockchain; Access control; Data security; Identity security; Network security; 68; MANAGEMENT-SYSTEM; SMART; INTERNET; SECURE; IOT;
D O I
10.1007/s00607-024-01381-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed ground stations are capable of realizing ubiquitous control of unmanned aerial vehicles (UAVs), breaking the restriction of limited network coverage of traditional central ground stations and improving the execution efficiency of complex tasks. However, with the increase of entities in the system architecture and the rapid changes in the authority of entities, the existing access control mechanism can no longer meet the needs of ubiquitous UAV tasks, and entities in the network and UAV tasks face identity spoofing, false data injection and other attacks. In this paper, we construct a blockchain-based entity access control scheme for ubiquitous UAV swarm tasks (BAC-UAV) to ensure data security and identity security during UAV task execution. Specifically, a blockchain-based UAV access control scheme is designed, in which the private cloud (PC) maintains a consortium blockchain to register and protect entities. The controller in the distributed control network and the UAV in the flight ad-hoc network (FANET) can mutually authenticate and confirm the legal identity of the entity based on the data in the blockchain. In addition, for the task, the dynamic task data group key and the dynamic identity group key are designed based on the homomorphic algorithm to secure the UAV task data and UAV identity respectively when the UAV members change in the task formation. The experimental results show that the computational costs and communication costs of BAC-UAV are reduced by approximately 21.7%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$21.7\%$$\end{document} and 2.8%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2.8\%$$\end{document}, respectively, compared to the comparison methods.
引用
收藏
页数:33
相关论文
共 47 条
[1]   Blockchain-Envisioned UAV Communication Using 6G Networks: Open Issues, Use Cases, and Future Directions [J].
Aggarwal, Shubhani ;
Kumar, Neeraj ;
Tanwar, Sudeep .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5416-5441
[2]   An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :133-144
[3]   A Proof-of-Quality-Factor (PoQF)-Based Blockchain and Edge Computing for Vehicular Message Dissemination [J].
Ayaz, Ferheen ;
Sheng, Zhengguo ;
Tian, Daxin ;
Guan, Yong Liang .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) :2468-2482
[4]   PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things [J].
Bao, Zijian ;
He, Debiao ;
Khan, Muhammad Khurram ;
Luo, Min ;
Xie, Qi .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) :1524-1534
[5]   Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment [J].
Bera, Basudeb ;
Das, Ashok Kumar ;
Sutrala, Anil Kumar .
COMPUTER COMMUNICATIONS, 2021, 166 :91-109
[6]   Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment [J].
Bera, Basudeb ;
Chattaraj, Durbadal ;
Das, Ashok Kumar .
COMPUTER COMMUNICATIONS, 2020, 153 :229-249
[7]   A Scalable Blockchain Framework for Secure Transactions in IoT [J].
Biswas, Sulit ;
Sharif, Kashif ;
Li, Fan ;
Nour, Boubakr ;
Wang, Yu .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4650-4659
[8]  
Blanchet B, 2015, Proverif 1.90: automatic cryptographic protocol verifier, user manual and tutorial
[9]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[10]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366