Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones

被引:160
作者
Feng, Chaosheng [1 ]
Liu, Bin [1 ]
Guo, Zhen [1 ]
Yu, Keping [2 ]
Qin, Zhiguang [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Sichuan Normal Univ, Coll Comp Sci, Chengdu 610101, Peoples R China
[2] Waseda Univ, Global Informat & Telecommun Inst, Tokyo 1698050, Japan
[3] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
日本学术振兴会; 中国国家自然科学基金;
关键词
Blockchains; Authentication; Drones; Security; Smart contracts; Peer-to-peer computing; 5G mobile communication; 5G-enabled drone; artificial intelligence (AI); blockchain; cross-domain authentication; distributed collaboration; smart contract; SECURITY; ATTACKS;
D O I
10.1109/JIOT.2021.3113321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While 5G can facilitate high-speed Internet access and make over-the-horizon control a reality for unmanned aerial vehicles (UAVs; also known as drones), there are also potential security and privacy considerations, for example, authentication among drones. Centralized authentication approaches not only suffer from a single point of failure but they are also incapable of cross-domain authentication. This complicates the cooperation of drones from different domains. To address these limitations, a blockchain-based cross-domain authentication scheme for intelligent 5G-enabled Internet of drones is proposed in this article. Our approach employs multiple signatures based on threshold sharing to build an identity federation for collaborative domains. This allows us to support domain joining and exiting. Reliable communication between cross-domain devices is achieved by utilizing smart contract for authentication. The session keys are negotiated to secure subsequent communication between two parties. Our security and performance evaluations show that the proposed scheme is resistant to common attacks targeting Internet of Things (IoT) devices (including drones), as well as demonstrating its effectiveness and efficiency.
引用
收藏
页码:6224 / 6238
页数:15
相关论文
共 26 条
[1]   DDoS Attack Mitigation in Internet of Things Using Software De ned Networking [J].
Ahmed, M. Ejaz ;
Kim, Hyoungshick .
2017 THIRD IEEE INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2017), 2017, :271-276
[2]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy, Riham ;
Youssef, Amr M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[3]  
Barka E., T EMERG TELECOMMUN T
[4]  
Benzarti S., 2019, PROC INT C INTELL SY, P205
[5]  
Buterin V., Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform
[6]  
Cachin Christian, 2016, WORKSH DISTR CRYPT C, V310, P1
[7]  
Cekerevac Z., 2017, MEST Journal, V5, P15
[8]   MACHINE LEARNING FOR WIRELESS CONNECTIVITY AND SECURITY OF CELLULAR-CONNECTED UAVS [J].
Challita, Ursula ;
Ferdowsi, Aidin ;
Chen, Mingzhe ;
Saad, Walid .
IEEE WIRELESS COMMUNICATIONS, 2019, 26 (01) :28-35
[9]   A Drone-Aided Blockchain-Based Smart Vehicular Network [J].
Cheema, Muhammad Asaad ;
Shehzad, Muhammad Karam ;
Qureshi, Hassaan Khaliq ;
Hassan, Syed Ali ;
Jung, Haejoon .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) :4160-4170
[10]   Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges [J].
Fotouhi, Azade ;
Qiang, Haoran ;
Ding, Ming ;
Hassan, Mahbub ;
Giordano, Lorenzo Galati ;
Garcia-Rodriguez, Adrian ;
Yuan, Jinhong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3417-3442