Securing Smart UAV Delivery Systems Using Zero Trust Principle -Driven Blockchain Architecture

被引:1
作者
Dong, Chengzu [1 ]
Pal, Shantanu [1 ]
An, Qi [1 ]
Yao, Ailing [2 ]
Jiang, Frank [1 ]
Xu, Zhiyu [3 ]
Li, Jianhua [1 ]
Lu, Meiqu [5 ]
Song, Yangxu [1 ]
Chen, Shiping [4 ]
Liu, Xiao [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Australia
[2] Anhui Univ, Sch Comp Sci & Technol, Hefei, Peoples R China
[3] Swinburne Univ Technol, Dept Engn Technol, Melbourne, Australia
[4] CSIRO, Data61, Sydney, Australia
[5] Guangxi Minzu Univ, Sch Artificial Intelligence, Nanning, Peoples R China
来源
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN | 2023年
关键词
Blockchain; Zero Trust; UAV Delivery; Security; Internet of Things; AUTHENTICATION;
D O I
10.1109/Blockchain60715.2023.00056
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a novel architecture that utilizes the Zero Trust Principle to facilitate blockchain-enabled Unmanned Aerial Vehicle (UAV) delivery systems, emphasizing recipient privacy, verification, and continuous authentication. By integrating blockchain's decentralization and transparency with a Zero Trust model, the architecture ensures robust security and access control. The blockchain-based architecture guarantees data integrity and resilience, while advanced cryptographic techniques, including homomorphic encryption, ensure long-term security. Ongoing security assessment and improvement are facilitated through the maturity model's integration with blockchain technology. This innovative approach effectively mitigates cyber risks, safeguards recipient data privacy, it initiative promotes the secure and efficient use of UAVs in logistics. It emphasizes the importance of maintaining strict access controls and trust boundaries. Through adaptable security evaluations, the model addresses evolving threats, ensuring a secure environment for UAV integration into the modern supply chain while prioritizing recipient privacy and security.
引用
收藏
页码:315 / 322
页数:8
相关论文
共 22 条
  • [1] CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things
    Al-Naji, Fatimah Hussain
    Zagrouba, Rachid
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) : 2497 - 2514
  • [2] Alladi T, 2020, IEEE Transactions on Vehicular Technology
  • [3] Benet J.., 2014, arXiv
  • [4] Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
    Buck, Christoph
    Olenberger, Christian
    Schweizer, Andre
    Volter, Fabiane
    Eymann, Torsten
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [5] A Traceable and Privacy-Preserving Authentication for UAV Communication Control System
    Chen, Chin-Ling
    Deng, Yong-Yuan
    Weng, Wei
    Chen, Chi-Hua
    Chiu, Yi-Jui
    Wu, Chih-Ming
    [J]. ELECTRONICS, 2020, 9 (01)
  • [6] SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles
    Cho, Geumhwan
    Cho, Junsung
    Hyun, Sangwon
    Kim, Hyoungshick
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (09):
  • [7] Continuous Authentication for UAV Delivery Systems Under Zero-Trust Security Framework
    Dong, Chengzu
    Jiang, Frank
    Chen, Shiping
    Liu, Xiao
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING & COMMUNICATIONS (IEEE EDGE 2022), 2022, : 123 - 132
  • [8] Vehicle Routing Problems for Drone Delivery
    Dorling, Kevin
    Heinrichs, Jordan
    Messier, Geoffrey G.
    Magierowski, Sebastian
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2017, 47 (01): : 70 - 85
  • [9] Self-Sovereign Identity for IoT environments: A Perspective
    Fedrecheski, Geovane
    Rabaey, Jan M.
    Costa, Laisa C. P.
    Calcina Ccori, Pablo C.
    Pereira, William T.
    Zuffo, Marcelo K.
    [J]. 2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [10] Intelligent UAV Identity Authentication and Safety Supervision Based on Behavior Modeling and Prediction
    Jiang, Changjun
    Fang, Yu
    Zhao, Peihai
    Panneerselvam, John
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) : 6652 - 6662