Blockchain model for environment/infrastructure monitoring in cloud-enabled high-altitude platform systems

被引:6
作者
Mershad, Khaleel [1 ]
Dahrouj, Hayssam [2 ]
机构
[1] Lebanese Amer Univ LAU, Comp Sci & Math Dept, Beirut, Lebanon
[2] Univ Sharjah UoS, Elect Engn Dept, Sharjah, U Arab Emirates
关键词
High -altitude platform system; Cloud computing; Blockchain; Sensor network; Environment and infrastructure monitoring; Consensus protocol; WIRELESS SENSOR NETWORKS; LIFETIME;
D O I
10.1016/j.vehcom.2023.100627
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The recently accentuated features of augmenting conventional wireless networks with high altitude platform systems (HAPS) have fueled a plethora of applications, which promise to offer new services to ground users, as well to enhance the efficiency and pervasion of existing applications. Cloud -enabled HAPS, which aims to create HAPS-based datacenters that offer cloud services to users, has particularly emerged as a promising key enabler to provide large-scale equitable services from the sky. Although offering cloud services from the HAPS proves to be efficient, its practical deployment at the stratosphere level still faces many challenges such as high energy requirements, physical maintenance, and is particularly prone to security considerations. Safeguarding the cloud-enabled HAPS against various cyberattacks is a necessity to guarantee its safe operation. This paper proposes a blockchain model to secure cloud-enabled HAPS networks that contain a large number of HAPS stations from recurring cyberattacks within the context of the environment and infrastructure monitoring (EIM) application. To this end, the paper first presents a detailed blockchain framework, and describes the ways of integrating the developed framework into the various system components. We then discuss the details of the system implementation, including the storing and consuming of cloud transactions, the generation of new blocks, and the blockchain consensus protocol that is tailored to the EIM requirements. Finally, we present numerical simulations that illustrate the performance of the system in terms of throughput, latency, and resilience to attacks.& COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:19
相关论文
共 43 条
[1]   CBE2R: clustered-based energy efficient routing protocol for underwater wireless sensor network [J].
Ahmed, Mukhtiar ;
Salleh, Mazleena ;
Channa, M. Ibrahim .
INTERNATIONAL JOURNAL OF ELECTRONICS, 2018, 105 (11) :1916-1930
[2]   High Altitude Platform Station Based Super Macro Base Station Constellations [J].
Alam, Md Sahabul ;
Kurt, Gunes Karabulut ;
Yanikomeroglu, Halim ;
Zhu, Peiying ;
Dao, Ngoc Dung .
IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (01) :103-109
[3]   Security to wireless sensor networks against malicious attacks using Hamming residue method [J].
Alotaibi, Majid .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
[4]   Improving Lifetime of Wireless Sensor Network Based on Sinks Mobility and Clustering Routing [J].
Amini, S. M. ;
Karimi, A. ;
Shehnepoor, S. R. .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) :2011-2024
[5]  
Anand Santosh, 2022, Soft Computing for Security Applications: Proceedings of ICSCS 2021. Advances in Intelligent Systems and Computing (1397), P383, DOI 10.1007/978-981-16-5301-8_29
[6]   Extending the Lifetime of Wireless Sensor Networks Through Adaptive Sleep [J].
Anastasi, Giuseppe ;
Conti, Marco ;
Di Francesco, Mario .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2009, 5 (03) :351-365
[7]  
[Anonymous], 2012, 4 INT ICST C SIM TOO
[8]  
Bhushan B, 2019, STUD COMPUT INTELL, V776, P215, DOI 10.1007/978-3-662-57277-1_10
[9]   Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures [J].
Butun, Ismail ;
Osterberg, Patrik ;
Song, Houbing .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :616-644
[10]  
Cloud computing - cso - central statistics office, 2020, US