Decentralized PKI Framework for Data Integrity in Spatial Crowdsourcing Drone Services

被引:2
作者
Akram, Junaid [1 ]
Anaissi, Ali [1 ,2 ]
机构
[1] Univ Sydney, Sch Comp Sci, Sydney, Australia
[2] Univ Technol Sydney, TD Sch, Sydney, Australia
来源
2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024 | 2024年
关键词
Data Integrity; Decentralized Trust; Public Key Infrastructure; Spatial Crowdsourcing; Certificate Authority;
D O I
10.1109/ICWS62655.2024.00084
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In the domain of spatial crowdsourcing drone services, which includes tasks like delivery, surveillance, and data collection, secure communication is paramount. The Public Key Infrastructure (PKI) ensures this by providing a system for digital certificates that authenticate the identities of entities involved, securing data and command transmissions between drones and their operators. However, the centralized trust model of traditional PKI, dependent on Certificate Authorities (CAs), presents a vulnerability due to its single point of failure, risking security breaches. To counteract this, the paper presents D2XChain, a blockchain-based PKI framework designed for the Internet of Drone Things (IoDT). By decentralizing the CA infrastructure, D2XChain eliminates this single point of failure, thereby enhancing the security and reliability of drone communications. Fully compatible with the X.509 standard, it integrates seamlessly with existing PKI systems, supporting all key operations such as certificate registration, validation, verification, and revocation in a distributed manner. This innovative approach not only strengthens the defense of drone services against various security threats but also showcases its practical application through deployment on a private Ethereum testbed, representing a significant advancement in addressing the unique security challenges of drone-based services and ensuring their trustworthy operation in critical tasks.
引用
收藏
页码:654 / 664
页数:11
相关论文
共 40 条
[11]  
Apple, List of available trusted root certificates in iOS 12, macOS 10.14, watchOS 5, and tvOS 12
[12]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[13]  
Axon L., 2016, 14 INT C SEC CRYPT S, V6
[14]   ARPKI: Attack Resilient Public-Key Infrastructure [J].
Basin, David ;
Cremers, Cas ;
Kim, Tiffany Hyun-Jin ;
Perrig, Adrian ;
Sasse, Ralf ;
Szalachowski, Pawel .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :382-393
[15]   XAuth: Efficient Privacy-Preserving Cross-Domain Authentication [J].
Chen, Jing ;
Zhan, Zeyi ;
He, Kun ;
Du, Ruiying ;
Wang, Donghui ;
Liu, Fei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :3301-3311
[16]  
Chen J, 2018, IEEE INFOCOM SER, P2069
[17]  
Davies J., 2011, Implementing SSL/TLS using cryptography and PKI
[18]   Bitcoin's Growing Energy Problem [J].
de Vries, Alex .
JOULE, 2018, 2 (05) :801-805
[19]   BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure [J].
Dykcik, Lukasz ;
Chuat, Laurent ;
Szalachowski, Pawel ;
Perrig, Adrian .
2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, :105-114
[20]  
Fromknecht C., 2014, DECENTRALIZED PUBLIC