Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

被引:80
作者
Bera, Basudeb [1 ]
Das, Ashok Kumar [1 ]
Sutrala, Anil Kumar [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[2] CA Technol, Hyderabad 500032, Telangana, India
关键词
Internet of drones (IoD); UAV detection and mitigation; Access control; Blockchain; Security; AVISPA; USER AUTHENTICATION SCHEME; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; MUTUAL AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; SECURE; SURVEILLANCE; CHALLENGES; 5G;
D O I
10.1016/j.comcom.2020.12.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or even damage the network reliability that can have direct impact on drones control. This may lead to a potential threat for people, governments, and business sectors. To deal with these issues, in this paper, we propose a novel access control scheme for unauthorized UAV detection and mitigation in an Internet of Drones (IoD) environment, called ACSUD-IoD. With the help of the blockchain-based solution incorporated in ACSUD-IoD, the transactional data having both the normal secure data from a drone (UAV) to the Ground Station Server (GSS) and the abnormal (suspected) data for detection of unauthorized UAVs by the GSS are stored in private blockchain, that are authentic and genuine. As a result, the Big data analytics can be performed on the authenticated transactional data stored in the blockchain. Through the detailed security analysis including formal security under the broadly-accepted Real-Or-Random (ROR) model, formal security verification using the widely-applied Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and non-mathematical security analysis show the robustness of the proposed scheme against a number of potential attacks needed in an IoD environment. The testbed experiments for various cryptographic primitives using the broadly-accepted Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) have been performed under both server and Raspberry PI 3 configurations. Furthermore, a detailed comparative analysis among the proposed scheme and other existing competing schemes shows the efficacy and more robustness as compared to the existing schemes. Finally, the blockchain-based practical demonstration shows the effectiveness of the proposed scheme.
引用
收藏
页码:91 / 109
页数:19
相关论文
共 84 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Ramzan, Muhammad Sher
    Al-Turjman, Fadi
    [J]. IEEE ACCESS, 2020, 8 : 43711 - 43724
  • [3] Alladi Tejasvi, 2020, Vehicular Communications, V23, DOI 10.1016/j.vehcom.2020.100249
  • [4] Alladi T., IEEE T VEH TECHNOL
  • [5] PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks
    Alladi, Tejasvi
    Chamola, Vinay
    Naren
    Kumar, Neeraj
    [J]. COMPUTER COMMUNICATIONS, 2020, 160 (160) : 81 - 90
  • [6] Consumer IoT: Security Vulnerability Case Studies and Solutions
    Alladi, Tejasvi
    Chamola, Vinay
    Sikdar, Biplab
    Choo, Kim-Kwang Raymond
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) : 17 - 25
  • [7] [Anonymous], 2020, Raspberry pi 3 model b+
  • [8] [Anonymous], 2001, FIPS PUB
  • [9] [Anonymous], 2011, 328AN190 ICAOS
  • [10] [Anonymous], 2020, Miracl Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library