Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

被引:2
作者
Mishra, Amit Kumar [1 ,2 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [3 ]
Singh, Jaskaran [1 ]
Vasilakos, Athanasios V. [4 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Univ Agder UiA, Ctr AI Res CAIR, N-4879 Grimstad, Norway
关键词
Internet of Drones (IoD); unmanned aerial vehicles (UAVs); cyber-attacks; blockchain; data analytics; security; USER AUTHENTICATION; INTERNET; SCHEME; MECHANISM; EXCHANGE; PROTOCOL; DESIGN; IOD;
D O I
10.3390/drones7080508
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of creative responses to a variety of challenges. The Internet of Drones (IoD) is a relatively new concept that has arisen as a consequence of the combination of drones and the Internet. The fifth-generation (5G) and beyond cellular networks (i.e., drones in networks beyond 5G) are promising solutions for achieving safe drone operations and applications. They may have many applications, like surveillance or urban areas, security, surveillance, retaliation, delivering items, smart farming, film production, capturing nature videos, and many more. Due to the fact that it is susceptible to a wide variety of cyber-attacks, there are certain concerns regarding the privacy and security of IoD communications. In this paper, a secure blockchain-enabled authentication key management framework with the big data analytics feature for drones in networks beyond 5G applications is proposed (in short, SBBDA-IoD). The security of SBBDA-IoD against multiple attacks is demonstrated through a detailed security analysis. The Scyther tool is used to perform a formal security verification test on the SBBDA-IoD's security, confirming the system's resistance to various potential attacks. A detailed comparative analysis has identified that SBBDA-IoD outperforms the other schemes by a significant margin. Finally, a real-world implementation of SBBDA-IoD is shown to evaluate its effect on several measures of performance.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] Subscription Management for Beyond 5G and 6G Cellular Networks using Blockchain Technology
    Aryal, Nischal
    Ghaffari, Fariba
    Bertin, Emmanuel
    Crespi, Noel
    2023 19TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT, CNSM, 2023,
  • [42] A Microservices-based Virtualized Blockchain Framework for Emerging 5G Data Networks
    Krishnaswamy, Dilip
    Bhatnagar, Aayush
    Chauhan, Kanchan
    Bhamrah, Dipender
    Srivastava, Shobhit
    Thakur, Sumit
    Bisht, Sandeep
    Narula, Sandeep
    Jangid, Kiran
    Jundre, Pramod
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [43] A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications
    Karnatak, Vijay
    Mishra, Amit Kumar
    Tripathi, Neha
    Wazid, Mohammad
    Singh, Jaskaran
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [44] A secure authentication and optimization based device-to-device communication for 5G enabled IoT applications of smart cities
    Rani, Therkkumthala Prakash
    Maruthu, Ayyadurai
    Ramakrishnan, Pavithra Guru
    Jayakumar, Cypto
    WIRELESS NETWORKS, 2025, : 3167 - 3186
  • [45] A Secure User Anonymity-Preserving Biometrics and PUF-Based Multiserver Authentication Scheme With Key Agreement in 5G Networks
    Xu, Deqin
    Bian, Weixin
    Li, Qingde
    Xie, Dong
    Zhao, Jun
    Hu, Yao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5170 - 5184
  • [46] An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
    Su, Xinzhong
    Xu, Youyun
    SENSORS, 2025, 25 (01)
  • [47] C-Block: A Secure and Robust Framework for Authentication Handover in 5G HetNets based on Edge-enabled SDN/NFV Environments
    Khan, Asad Faraz
    Nanda, Priyadarsi
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1509 - 1514
  • [48] Distributed Trusted Authority-based Key Management for Beyond 5G Network Coding-enabled Mobile Small Cells
    de Ree, Marcus
    Mantas, Georgios
    Rodriguez, Jonathan
    Otung, Ifiok E.
    2019 IEEE 2ND 5G WORLD FORUM (5GWF), 2019, : 80 - 85
  • [49] When Deep Reinforcement Learning Meets 5G-Enabled Vehicular Networks: A Distributed Offloading Framework for Traffic Big Data
    Ning, Zhaolong
    Dong, Peiran
    Wang, Xiaojie
    Obaidat, Mohammad S.
    Hu, Xiping
    Guo, Lei
    Guo, Yi
    Huang, Jun
    Hu, Bin
    Li, Ye
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (02) : 1352 - 1361
  • [50] Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
    ul Haq, Inam
    Wang, Jian
    Zhu, Youwen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 161