Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

被引:2
|
作者
Mishra, Amit Kumar [1 ,2 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [3 ]
Singh, Jaskaran [1 ]
Vasilakos, Athanasios V. [4 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Univ Agder UiA, Ctr AI Res CAIR, N-4879 Grimstad, Norway
关键词
Internet of Drones (IoD); unmanned aerial vehicles (UAVs); cyber-attacks; blockchain; data analytics; security; USER AUTHENTICATION; INTERNET; SCHEME; MECHANISM; EXCHANGE; PROTOCOL; DESIGN; IOD;
D O I
10.3390/drones7080508
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of creative responses to a variety of challenges. The Internet of Drones (IoD) is a relatively new concept that has arisen as a consequence of the combination of drones and the Internet. The fifth-generation (5G) and beyond cellular networks (i.e., drones in networks beyond 5G) are promising solutions for achieving safe drone operations and applications. They may have many applications, like surveillance or urban areas, security, surveillance, retaliation, delivering items, smart farming, film production, capturing nature videos, and many more. Due to the fact that it is susceptible to a wide variety of cyber-attacks, there are certain concerns regarding the privacy and security of IoD communications. In this paper, a secure blockchain-enabled authentication key management framework with the big data analytics feature for drones in networks beyond 5G applications is proposed (in short, SBBDA-IoD). The security of SBBDA-IoD against multiple attacks is demonstrated through a detailed security analysis. The Scyther tool is used to perform a formal security verification test on the SBBDA-IoD's security, confirming the system's resistance to various potential attacks. A detailed comparative analysis has identified that SBBDA-IoD outperforms the other schemes by a significant margin. Finally, a real-world implementation of SBBDA-IoD is shown to evaluate its effect on several measures of performance.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Blockchain-Enabled Secure Big Data Analytics for Internet of Things Smart Applications
    Tekchandani, Prakash
    Pradhan, Indranil
    Das, Ashok Kumar
    Kumar, Neeraj
    Park, Youngho
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 6428 - 6443
  • [2] Designing secure blockchain-based authentication and key management mechanism for Internet of Drones applications
    Wazid, Mohammad
    Mittal, Saksham
    Das, Ashok Kumar
    Islam, S. K. Hafizul
    Alenazi, Mohammed J. F.
    V. Vasilakos, Athanasios
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 160
  • [3] On the Performance of Blockchain-enabled RAN-as-a-service in Beyond 5G Networks
    Wilhelmi, Francesc
    Giupponi, Lorenza
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [4] Blockchain-Enabled Secure Collaborative Model Learning Using Differential Privacy for IoT-Based Big Data Analytics
    Tekchandani, Prakash
    Bisht, Abhishek
    Das, Ashok Kumar
    Kumar, Neeraj
    Karuppiah, Marimuthu
    Vijayakumar, Pandi
    Park, Youngho
    IEEE TRANSACTIONS ON BIG DATA, 2025, 11 (01) : 141 - 156
  • [5] Blockchain Enabled SDN Framework for Security Management in 5G Applications
    Das, Debashis
    Banerjee, Sourav
    Dasgupta, Kousik
    Chatterjee, Pushpita
    Ghosh, Uttam
    Biswas, Utpal
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2023, 2023, : 414 - 419
  • [6] Blockchain-Enabled Electrical Fault Inspection and Secure Transmission in 5G Smart Grids
    Ning, Zhaolong
    Chen, Handi
    Wang, Xiaojie
    Wang, Shupeng
    Guo, Lei
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2022, 16 (01) : 82 - 96
  • [7] Blockchain-enabled anonymous mutual authentication and location privacy-preserving scheme for 5G networks
    Haddad, Zaher
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (06)
  • [8] Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
    Jangirala, Srinivas
    Das, Ashok Kumar
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7081 - 7093
  • [9] Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks
    Yazdinejad, Abbas
    Parizi, Reza M.
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1120 - 1132
  • [10] Optimal pricing-based computation offloading and resource allocation for blockchain-enabled beyond 5G networks
    Zhang, Kaiyuan
    Gui, Xiaolin
    Ren, Dewang
    Du, Tianjiao
    He, Xin
    COMPUTER NETWORKS, 2022, 203