Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

被引:2
作者
Mishra, Amit Kumar [1 ,2 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [3 ]
Singh, Jaskaran [1 ]
Vasilakos, Athanasios V. [4 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Univ Agder UiA, Ctr AI Res CAIR, N-4879 Grimstad, Norway
关键词
Internet of Drones (IoD); unmanned aerial vehicles (UAVs); cyber-attacks; blockchain; data analytics; security; USER AUTHENTICATION; INTERNET; SCHEME; MECHANISM; EXCHANGE; PROTOCOL; DESIGN; IOD;
D O I
10.3390/drones7080508
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of creative responses to a variety of challenges. The Internet of Drones (IoD) is a relatively new concept that has arisen as a consequence of the combination of drones and the Internet. The fifth-generation (5G) and beyond cellular networks (i.e., drones in networks beyond 5G) are promising solutions for achieving safe drone operations and applications. They may have many applications, like surveillance or urban areas, security, surveillance, retaliation, delivering items, smart farming, film production, capturing nature videos, and many more. Due to the fact that it is susceptible to a wide variety of cyber-attacks, there are certain concerns regarding the privacy and security of IoD communications. In this paper, a secure blockchain-enabled authentication key management framework with the big data analytics feature for drones in networks beyond 5G applications is proposed (in short, SBBDA-IoD). The security of SBBDA-IoD against multiple attacks is demonstrated through a detailed security analysis. The Scyther tool is used to perform a formal security verification test on the SBBDA-IoD's security, confirming the system's resistance to various potential attacks. A detailed comparative analysis has identified that SBBDA-IoD outperforms the other schemes by a significant margin. Finally, a real-world implementation of SBBDA-IoD is shown to evaluate its effect on several measures of performance.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing
    Sanjeev Kumar
    Haider Banka
    Baijnath Kaushik
    Wireless Networks, 2023, 29 : 2105 - 2126
  • [32] GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G
    Jadav, Nilesh Kumar
    Kakkar, Riya
    Mankodiya, Harsh
    Gupta, Rajesh
    Tanwar, Sudeep
    Agrawal, Smita
    Sharma, Ravi
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (02) : 422 - 435
  • [33] Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review
    Miglani, Arzoo
    Kumar, Neeraj
    COMPUTER COMMUNICATIONS, 2021, 178 : 37 - 63
  • [34] Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks
    Thirunavukkarasu, V.
    Kumar, A. Senthil
    Prakasam, P.
    Suresh, G.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 21131 - 21145
  • [35] Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks
    Dakshita Reebadiya
    Tejal Rathod
    Rajesh Gupta
    Sudeep Tanwar
    Neeraj Kumar
    Peer-to-Peer Networking and Applications, 2021, 14 : 2757 - 2774
  • [36] Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
    Bera, Basudeb
    Saha, Sourav
    Das, Ashok Kumar
    Kumar, Neeraj
    Lorenz, Pascal
    Alazab, Mamoun
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 9097 - 9111
  • [37] 5G Message Cooperative Content Caching Scheme for Blockchain-Enabled Mobile Edge Networks Using Reinforcement Learning
    Du, Mei
    Sun, Siyuan
    Ren, Ligang
    Tian, Dong
    Wei, Yifei
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT I, 2022, 13338 : 559 - 572
  • [38] Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks
    Reebadiya, Dakshita
    Rathod, Tejal
    Gupta, Rajesh
    Tanwar, Sudeep
    Kumar, Neeraj
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2757 - 2774
  • [39] Provably Secure Client-Server Key Management Scheme in 5G Networks
    Yang, Lei
    Chen, Yeh-Cheng
    Wu, Tsu-Yang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [40] Subscription Management for Beyond 5G and 6G Cellular Networks using Blockchain Technology
    Aryal, Nischal
    Ghaffari, Fariba
    Bertin, Emmanuel
    Crespi, Noel
    2023 19TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT, CNSM, 2023,