Securing Smart UAV Delivery Systems Using Zero Trust Principle -Driven Blockchain Architecture

被引:1
作者
Dong, Chengzu [1 ]
Pal, Shantanu [1 ]
An, Qi [1 ]
Yao, Ailing [2 ]
Jiang, Frank [1 ]
Xu, Zhiyu [3 ]
Li, Jianhua [1 ]
Lu, Meiqu [5 ]
Song, Yangxu [1 ]
Chen, Shiping [4 ]
Liu, Xiao [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Australia
[2] Anhui Univ, Sch Comp Sci & Technol, Hefei, Peoples R China
[3] Swinburne Univ Technol, Dept Engn Technol, Melbourne, Australia
[4] CSIRO, Data61, Sydney, Australia
[5] Guangxi Minzu Univ, Sch Artificial Intelligence, Nanning, Peoples R China
来源
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN | 2023年
关键词
Blockchain; Zero Trust; UAV Delivery; Security; Internet of Things; AUTHENTICATION;
D O I
10.1109/Blockchain60715.2023.00056
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a novel architecture that utilizes the Zero Trust Principle to facilitate blockchain-enabled Unmanned Aerial Vehicle (UAV) delivery systems, emphasizing recipient privacy, verification, and continuous authentication. By integrating blockchain's decentralization and transparency with a Zero Trust model, the architecture ensures robust security and access control. The blockchain-based architecture guarantees data integrity and resilience, while advanced cryptographic techniques, including homomorphic encryption, ensure long-term security. Ongoing security assessment and improvement are facilitated through the maturity model's integration with blockchain technology. This innovative approach effectively mitigates cyber risks, safeguards recipient data privacy, it initiative promotes the secure and efficient use of UAVs in logistics. It emphasizes the importance of maintaining strict access controls and trust boundaries. Through adaptable security evaluations, the model addresses evolving threats, ensuring a secure environment for UAV integration into the modern supply chain while prioritizing recipient privacy and security.
引用
收藏
页码:315 / 322
页数:8
相关论文
共 22 条
[11]  
Meng L, 2022, CHINA COMMUN, V19, P198, DOI 10.23919/JCC.2022.08.015
[12]   Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications [J].
Ometov, Aleksandr ;
Petrov, Vitaly ;
Bezzateev, Sergey ;
Andreev, Sergey ;
Koucheryavy, Yevgeni ;
Gerla, Mario .
IEEE NETWORK, 2019, 33 (02) :82-88
[13]  
Pal S, 2020, Assistive technology for the elderly, P1
[14]  
Pal S, 2017, I CONF SENS TECHNOL, P286
[15]   Lightweight Authentication Protocol for Unmanned Aerial Vehicles Using Physical Unclonable Function and Chaotic System [J].
Pu, Cong ;
Li, Yucheng .
2020 26TH IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (IEEE LANMAN), 2020,
[16]   BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts [J].
Qin, Xianrui ;
Pan, Shimin ;
Mirzaei, Arash ;
Sui, Zhimei ;
Ersoy, Oguzhan ;
Sakzad, Amin ;
Esgin, Muhammed F. ;
Liu, Joseph K. ;
Yu, Jiangshan ;
Yuen, Tsz Hon .
2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, :2462-2480
[17]   Authentication Methods for UAV Communication [J].
Rodrigues, Mariana ;
Amaro, Jean ;
Osorio, Fernando Santos ;
Branco, Kalinka R. L. J. C. .
2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, :1210-1215
[18]  
Shoufan A, 2017, IEEE INT CONF VLSI, P226
[19]   EXPRESS: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems [J].
Xu, Jia ;
Liu, Xiao ;
Li, Xuejun ;
Zhang, Lei ;
Yang, Yun .
2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, :1283-1286
[20]   Security analysis of drones systems: Attacks, limitations, and recommendations [J].
Yaacoub, Jean-Paul ;
Noura, Hassan ;
Salman, Ola ;
Chehab, Ali .
INTERNET OF THINGS, 2020, 11