BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones

被引:10
作者
Qiao, Gongzhe [1 ]
Zhuang, Yi [1 ]
Ye, Tong [1 ]
Qiao, Yuan [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211100, Peoples R China
[2] STATE GRID Corp China, Harbin Elect Power Bur, Harbin 150050, Peoples R China
基金
中国国家自然科学基金;
关键词
blockchain; Internet of Drone; cross-domain authentication; security protocol; multi-UAVs; group policy; UNMANNED AERIAL VEHICLES; ACCESS-CONTROL; SECURITY; FRAMEWORK; NETWORKS;
D O I
10.3390/drones7050302
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
During long-distance flight, unmanned aerial vehicles (UAVs) need to perform cross-domain authentication to prove their identity and receive information from the ground control station (GCS). However, the GCS needs to verify all drones arriving at the area it is responsible for, which leads to the GCS being unable to complete authentication in time when facing cross-domain requests from a large number of drones. Additionally, due to potential threats from attackers, drones and GCSs are likely to be deceived. To improve the efficiency and security of cross-domain authentication, we propose an efficient blockchain-based cross-domain authentication scheme for the Internet of Drones (BCDAIoD). By using a consortium chain with a multi-chain architecture, the proposed method can query and update different types of data efficiently. By mutual authentication before cross-domain authentication, drones can compose drone groups to lighten the authentication workload of domain management nodes. BCDAIoD uses the notification mechanism between domains to enable path planning for drones in advance, which can further improve the efficiency of cross-domain authentication. The performance of BCDAIoD was evaluated through experiments. The results show that the cross-domain authentication time cost and computational overhead of BCDAIoD are significantly lower those of than existing methods when the number of drones is large.
引用
收藏
页数:26
相关论文
共 36 条
[31]   Service Function Chain Scheduling in Heterogeneous Multi-UAV Edge Computing [J].
Wang, Yangang ;
Wang, Hai ;
Wei, Xianglin ;
Zhao, Kuang ;
Fan, Jianhua ;
Chen, Juan ;
Hu, Yongyang ;
Jia, Runa .
DRONES, 2023, 7 (02)
[32]   Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Alazab, Mamoun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (10) :7174-7184
[33]   Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing [J].
Xu, Shengmin ;
Ning, Jianting ;
Li, Yingjiu ;
Zhang, Yinghui ;
Xu, Guowen ;
Huang, Xinyi ;
Deng, Robert H. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1064-1077
[34]   Physical Layer Security for NOMA Transmission in mmWave Drone Networks [J].
Yapici, Yavuz ;
Rupasinghe, Nadisanka ;
Guvenc, Ismail ;
Dai, Huaiyu ;
Bhuyan, Arupjyoti .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (04) :3568-3582
[35]   SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments [J].
Yu, Sungjin ;
Das, Ashok Kumar ;
Park, Youngho ;
Lorenz, Pascal .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (10) :10374-10388
[36]   BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme [J].
Zhang, Hongxia ;
Chen, Xingshu ;
Lan, Xiao ;
Jin, Hongjian ;
Cao, Qi .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55