BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones

被引:10
作者
Qiao, Gongzhe [1 ]
Zhuang, Yi [1 ]
Ye, Tong [1 ]
Qiao, Yuan [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211100, Peoples R China
[2] STATE GRID Corp China, Harbin Elect Power Bur, Harbin 150050, Peoples R China
基金
中国国家自然科学基金;
关键词
blockchain; Internet of Drone; cross-domain authentication; security protocol; multi-UAVs; group policy; UNMANNED AERIAL VEHICLES; ACCESS-CONTROL; SECURITY; FRAMEWORK; NETWORKS;
D O I
10.3390/drones7050302
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
During long-distance flight, unmanned aerial vehicles (UAVs) need to perform cross-domain authentication to prove their identity and receive information from the ground control station (GCS). However, the GCS needs to verify all drones arriving at the area it is responsible for, which leads to the GCS being unable to complete authentication in time when facing cross-domain requests from a large number of drones. Additionally, due to potential threats from attackers, drones and GCSs are likely to be deceived. To improve the efficiency and security of cross-domain authentication, we propose an efficient blockchain-based cross-domain authentication scheme for the Internet of Drones (BCDAIoD). By using a consortium chain with a multi-chain architecture, the proposed method can query and update different types of data efficiently. By mutual authentication before cross-domain authentication, drones can compose drone groups to lighten the authentication workload of domain management nodes. BCDAIoD uses the notification mechanism between domains to enable path planning for drones in advance, which can further improve the efficiency of cross-domain authentication. The performance of BCDAIoD was evaluated through experiments. The results show that the cross-domain authentication time cost and computational overhead of BCDAIoD are significantly lower those of than existing methods when the number of drones is large.
引用
收藏
页数:26
相关论文
共 36 条
[1]   A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks [J].
Abdel-Malek, Mai A. ;
Akkaya, Kemal ;
Bhuyan, Arupjyoti ;
Ibrahim, Ahmed S. .
IEEE ACCESS, 2022, 10 :57485-57498
[2]   Reinforcing Communication on the Internet of Aerial Vehicles [J].
Abul Hassan, Muhammad ;
Javed, Abdul Rehman ;
Hassan, Tayyabah ;
Band, Shahab S. ;
Sitharthan, R. ;
Rizwan, Muhammad .
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (03) :1288-1297
[3]  
Al-Hilo Ahmed, 2020, DroneCom '20: Proceedings of the 2nd MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, P73, DOI 10.1145/3414045.3415947
[4]   BCON: Blockchain based access CONtrol across multiple conflict of interest domains [J].
Ali, Gauhar ;
Ahmad, Naveed ;
Cao, Yue ;
Ali, Qazi Ejaz ;
Azim, Fazal ;
Cruickshank, Haitham .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 147
[5]  
Arafat MY, 2019, I C SOFTWARE KNOWL I, DOI [10.1109/skima47702.2019.8982391, 10.23919/splitech.2019.8783092]
[6]   Distributed Dynamic Resource Management and Pricing in the IoT Systems With Blockchain-as-a-Service and UAV-Enabled Mobile Edge Computing [J].
Asheralieva, Alia ;
Niyato, Dusit .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03) :1974-1993
[7]   Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment [J].
Bera, Basudeb ;
Chattaraj, Durbadal ;
Das, Ashok Kumar .
COMPUTER COMMUNICATIONS, 2020, 153 :229-249
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]   A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications [J].
Ever, Yoney Kirsal .
COMPUTER COMMUNICATIONS, 2020, 155 :143-149
[10]   Handle with Care: Adoption of Drone Delivery Services [J].
Farah, Maya F. ;
Mrad, Mona ;
Ramadan, Zahy ;
Hamdane, Houssam .
ADVANCES IN NATIONAL BRAND AND PRIVATE LABEL MARKETING, 2020, :22-29