Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

被引:2
|
作者
Mishra, Amit Kumar [1 ,2 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [3 ]
Singh, Jaskaran [1 ]
Vasilakos, Athanasios V. [4 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Univ Agder UiA, Ctr AI Res CAIR, N-4879 Grimstad, Norway
关键词
Internet of Drones (IoD); unmanned aerial vehicles (UAVs); cyber-attacks; blockchain; data analytics; security; USER AUTHENTICATION; INTERNET; SCHEME; MECHANISM; EXCHANGE; PROTOCOL; DESIGN; IOD;
D O I
10.3390/drones7080508
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of creative responses to a variety of challenges. The Internet of Drones (IoD) is a relatively new concept that has arisen as a consequence of the combination of drones and the Internet. The fifth-generation (5G) and beyond cellular networks (i.e., drones in networks beyond 5G) are promising solutions for achieving safe drone operations and applications. They may have many applications, like surveillance or urban areas, security, surveillance, retaliation, delivering items, smart farming, film production, capturing nature videos, and many more. Due to the fact that it is susceptible to a wide variety of cyber-attacks, there are certain concerns regarding the privacy and security of IoD communications. In this paper, a secure blockchain-enabled authentication key management framework with the big data analytics feature for drones in networks beyond 5G applications is proposed (in short, SBBDA-IoD). The security of SBBDA-IoD against multiple attacks is demonstrated through a detailed security analysis. The Scyther tool is used to perform a formal security verification test on the SBBDA-IoD's security, confirming the system's resistance to various potential attacks. A detailed comparative analysis has identified that SBBDA-IoD outperforms the other schemes by a significant margin. Finally, a real-world implementation of SBBDA-IoD is shown to evaluate its effect on several measures of performance.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
    Wang, Zhihua
    Wang, Shuaibo
    Wang, Haofan
    Li, Jiaze
    Yao, Yizhe
    Wang, Yongjian
    Yang, Xiaolong
    CHINA COMMUNICATIONS, 2025, 22 (03) : 270 - 287
  • [22] Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET
    Gupta, Nishu
    Manaswini, Ravikanti
    Saikrishna, Bongaram
    Silva, Francisco
    Teles, Ariel
    FUTURE INTERNET, 2020, 12 (04)
  • [23] Blockchain-Enabled Multi-Operator Small Cell Network for Beyond 5G Systems
    Okon, Asuquo
    Jagannath, Nishant
    Elgendi, Ibrahim
    Elmirghani, Jaafar M. H.
    Jamalipour, Abbas
    Munasinghe, Kumudu
    IEEE NETWORK, 2020, 34 (05): : 171 - 177
  • [24] Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing
    Kumar, Sanjeev
    Banka, Haider
    Kaushik, Baijnath
    WIRELESS NETWORKS, 2023, 29 (05) : 2105 - 2126
  • [25] A Comprehensive Survey on Blockchain for Secure IoT- enabled Smart City beyond 5G: Approaches, Processes, Challenges, and Opportunities
    Singh, Sushil Kumar
    Azzaoui, Abir E. L.
    Choo, Kim-Kwang Raymond
    Yang, Laurence T.
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2023, 13
  • [26] Formal Analysis of 5G Authentication and Key Management for Applications (AKMA)
    Yang, Tengshun
    Wang, Shuling
    Zhan, Bohua
    Zhan, Naijun
    Li, Jinghui
    Xiang, Shuangqing
    Xiang, Zhan
    Mao, Bifei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 126
  • [27] Trust Management Framework for Containerized Workloads Applications to 5G Networks
    Miloudi, Aicha
    Suarez, Luis
    Cuppens, Nora Boulahia
    Cuppens, Frederic
    Preda, Stere
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 378 - 393
  • [28] 5G Wireless Networks Meet Big Data: Challenges, Trends, and Applications
    Zhu Changbo
    Cheng Xinzhou
    Ye Haina
    Yang Jianjian
    Xu Lexi
    Chao Kun
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 1513 - 1516
  • [29] Integrating Blockchain Technology with PKI for Secure and Interoperable Communication in 5G and Beyond Vehicular Networks
    Shewajo, Fetulhak Abdurahman
    Boualouache, Abdelwahab
    Senouci, Sidi Mohammed
    El-Korbi, Ines
    Brik, Bouziane
    Fante, Kinde Anlay
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 998 - 1001
  • [30] A Novel Big Data Intelligence Analytics Framework for 5G-Enabled IoT Healthcare
    Sabri, Yassine
    Outzourhit, Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (08) : 798 - 804