Blockchain-Empowered Space-Air-Ground Integrated Networks: Opportunities, Challenges, and Solutions

被引:98
作者
Wang, Yuntao [1 ]
Su, Zhou [1 ]
Ni, Jianbing [2 ]
Zhang, Ning [3 ]
Shen, Xuemin [4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian 710049, Peoples R China
[2] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
[3] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[4] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2022年 / 24卷 / 01期
关键词
Blockchains; Internet of Things; Security; Reliability; Privacy; Vehicle dynamics; Smart devices; Blockchain; space-air-ground integrated network (SAGIN); Internet of Things (IoT); security; privacy; trust; network optimization; FUTURE WIRELESS NETWORKS; INDUSTRIAL INTERNET; RESEARCH ISSUES; ENABLED INTERNET; SMART CONTRACTS; DATA-MANAGEMENT; SECURE; THINGS; ARCHITECTURE; IOT;
D O I
10.1109/COMST.2021.3131711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The terrestrial networks face the challenges of severe cost inefficiency and low feasibility to provide seamless services anytime and anywhere, especially in the extreme or hotspot areas (e.g., disaster areas, mountains, and oceans) due to limited service coverage and capacity. The integration of multi-dimensional networks consisting of space, air, and ground layers is expected to provide solutions in delivering cost-effective and ubiquitous Internet of things (IoT) services for billions of users and interconnected smart devices. Autonomous data collection, exchange, and processing across different network segments with minimal human interventions in space-air-ground IoT (SAG-IoT) can bring great convenience to consumers, however, it also suffers new attacks from intruders. Severe privacy invasion, reliability issues, and security breaches of SAG-IoT can hinder its wide deployment. The emerging blockchain holds great potentials to address the security concerns in SAG-IoT, thanks to its prominent features of decentralization, transparency, immutability, traceability, and auditability. Despite of the benefits of blockchain-empowered SAG-IoT, there exist a series of fundamental challenges in terms of efficiency and regulation due to the intrinsic characteristics of SAG-IoT (e.g., heterogeneity, time-variability, and poor interoperability) and the limitations of existing blockchain approaches (e.g., capacity and scalability). This article presents a comprehensive survey of the integration of blockchain technologies for securing SAG-IoT applications. Specifically, we first discuss the architecture, characteristics, and security threats of SAG-IoT systems. Then, we concentrate on the promising blockchain-based solutions for SAG-IoT security. Next, we discuss the critical challenges when integrating blockchain in SAG-IoT security services and review the state-of-the-art solutions. We further investigate the opportunities of blockchain in artificial intelligence and beyond 5G networks and provide open research directions for building future blockchain-empowered SAG-IoT systems.
引用
收藏
页码:160 / 209
页数:50
相关论文
共 215 条
  • [1] Secure Communication for Multiquadrotor Networks Using Ethereum Blockchain
    Abichandani, Pramod
    Lobo, Deepan
    Kabrawala, Smit
    McIntyre, William
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03): : 1783 - 1796
  • [2] Abomhara M., 2015, Journal of Cyber Security and Mobility, P65, DOI [10.13052/jcsm2245-1439.414, DOI 10.13052/JCSM2245-1439.414]
  • [3] Analysis of identifiers in IoT platforms
    Aftab, Haris
    Gilani, Komal
    Lee, JiEun
    Nkenyereye, Lewis
    Jeong, SeungMyeong
    Song, JaeSeung
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (03) : 333 - 340
  • [4] Applications of Blockchains in the Internet of Things: A Comprehensive Survey
    Ali, Muhammad Salek
    Vecchio, Massimo
    Pincheira, Miguel
    Dolui, Koustabh
    Antonelli, Fabio
    Rehmani, Mubashir Husain
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1676 - 1717
  • [5] AlQahtani S, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P998, DOI 10.1109/FTC.2016.7821725
  • [6] Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
  • [7] Androulaki E., 2013, Revised Selected Papers, V7859, P34, DOI DOI 10.1007/978-3-642-39884-1
  • [8] Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
    Androulaki, Elli
    Barger, Artem
    Bortnikov, Vita
    Cachin, Christian
    Christidis, Konstantinos
    De Caro, Angelo
    Enyeart, David
    Ferris, Christopher
    Laventman, Gennady
    Manevich, Yacov
    Muralidharan, Srinivasan
    Murthy, Chet
    Binh Nguyen
    Sethi, Manish
    Singh, Gari
    Smith, Keith
    Sorniotti, Alessandro
    Stathakopoulou, Chrysoula
    Vukolic, Marko
    Cocco, Sharon Weed
    Yellick, Jason
    [J]. EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
  • [9] [Anonymous], 2019, BLOCKCH WILL STRENGT
  • [10] BIAS: Bluetooth Impersonation AttackS
    Antonioli, Daniele
    Tippenhauer, Nils Ole
    Rasmussen, Kasper
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 549 - 562