Blockchain-Assisted Efficient Data Sharing Scheme With Accountability and Privacy-Preserving for Internet of Drones Networks

被引:1
作者
Zhou, Zequan [1 ]
Luo, Xiling [1 ]
Mao, Jian [2 ,3 ]
He, Ting [1 ]
Ji, Xiaohai [1 ]
Wang, Junjun [1 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[3] Tianmushan Lab, Hangzhou 311121, Peoples R China
基金
中国国家自然科学基金;
关键词
Receivers; Drones; Autonomous aerial vehicles; Point-to-multipoint communications; Encryption; Costs; Vehicle dynamics; Smart contracts; Heuristic algorithms; Elliptic curve cryptography; Accountability; blockchain; data sharing; IoD networks; privacy; BROADCAST ENCRYPTION; SECURITY; ISSUES;
D O I
10.1109/TVT.2024.3476670
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Drones (IoD) has become crucial due to the surge of drone-based applications. In a dynamic wireless network, drones often share data with multiple users, which is vulnerable to various security threats, e.g., eavesdropping, privacy leakage, and impersonation. Ensuring secure sharing of drone operation data is a critical issue. Existing schemes employ blockchain to ensure accountability in untrusted IoD contexts. However, drones perform excessive operations, e.g., consensus and homomorphic encryption, leading to impractical drone computation overhead. Furthermore, these existing schemes perform point-to-multipoint (P2MP) data sharing by using identity-based broadcast encryption (IBBE) as it has stateless receiver property, i.e., drones can directly establish sharing groups based on the receiver identities. However, these IBBE-based schemes need to preset the sharing group capacity, reducing sharing efficiency and flexibility in dynamic IoD networks. Also, identities in sharing groups probably result in receiver privacy breaches. In this paper, we propose a blockchain-assisted data-sharing scheme with accountability and privacy-preserving for IoD networks. We utilize on-chain immutable smart contracts and short signatures to construct a lightweight accountability mechanism that can verify and punish the above misbehavior. We develop an efficient privacy-preserving IBBE algorithm for P2MP sharing of drone operation data that enables dynamic group sharing. We prove that our algorithm is secure and receiver anonymity against chosen ciphertext attacks. The experiment results show that our scheme outperforms existing schemes in computational and communication overhead. In real-world logistics scenarios, the wireless data rate of 50Mbps can satisfy the communication requirements for ciphertext lengths up to 19.5KB. For a sharing group of 60 receivers, drone encryption costs only about 101 ms. The decryption cost remains constant and takes about 3.1 ms.
引用
收藏
页码:3253 / 3268
页数:16
相关论文
共 50 条
[11]  
European Union Aviation Safety Agency & SESAR Joint Undertaking, 2017, U-space: Blueprint
[12]  
Fadlullah Zubair Md, 2021, IEEE Internet of Things Magazine, V4, P40, DOI [10.1109/iotm.001.2100103, 10.1109/IOTM.001.2100103]
[13]   A Secure Intrusion Detection Platform Using Blockchain and Radial Basis Function Neural Networks for Internet of Drones [J].
Heidari, Arash ;
Navimipour, Nima Jafari ;
Unal, Mehmet .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) :8445-8454
[14]   Privacy-preserving identity-based broadcast encryption [J].
Hur, Junbeom ;
Park, Chanil ;
Hwang, Seong Oun .
INFORMATION FUSION, 2012, 13 (04) :296-303
[15]   BUAV: A Blockchain Based Secure UAV-Assisted Data Acquisition Scheme in Internet of Things [J].
Islam, Anik ;
Shin, Soo Young .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2019, 21 (05) :491-502
[16]  
Jianchang Lai, 2016, Information Security and Privacy. 21st Australasian Conference, ACISP 2016. Proceedings: LNCS 9723, P223, DOI 10.1007/978-3-319-40367-0_14
[17]   Securing Data Sharing from the Sky: Integrating Blockchains into Drones in 5G and Beyond [J].
Kang, Jiawen ;
Xiong, Zehui ;
Niyato, Dusit ;
Xie, Shengli ;
Kim, Dong In .
IEEE NETWORK, 2021, 35 (01) :78-85
[18]   Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks [J].
Kang, Jiawen ;
Yu, Rong ;
Huang, Xumin ;
Wu, Maoqiang ;
Maharjan, Sabita ;
Xie, Shengli ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4660-4670
[19]   A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems [J].
Khan, Muhammad Asghar ;
Ullah, Insaf ;
Alkhalifah, Ali ;
Rehman, Sajjad Ur ;
Shah, Jawad Ali ;
Uddin, Irfan ;
Alsharif, Mohammed H. ;
Algarni, Fahad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) :3416-3425
[20]   Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext [J].
Kim, Jongkil ;
Susilo, Willy ;
Au, Man Ho ;
Seberry, Jennifer .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :679-693