Security and privacy of UAV data using blockchain technology

被引:94
作者
Ch, Rupa [1 ]
Srivastava, Gautam [2 ,3 ]
Gadekallu, Thippa Reddy [4 ]
Maddikunta, Praveen Kumar Reddy [4 ]
Bhattacharya, Sweta [4 ]
机构
[1] VR Siddhartha Engn Coll, Dept Comp Sci, Vijayawada 520007, India
[2] Brandon Univ, Dept Math & Comp Sci, 270 18th St, Brandon, MB R7A 6A9, Canada
[3] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[4] VIT Vellore, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
基金
加拿大自然科学与工程研究理事会;
关键词
Internet of things; UAV; Drones; Blockchain; Security; Privacy; INTERNET; NETWORKS; FRAMEWORK; SMART;
D O I
10.1016/j.jisa.2020.102670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The utility of virtual circuit (VC) based devices UAVs, Drones, and similar other IoT based devices have gained immense momentum in the present day and age. These devices are predominantly used for aerial surveying in sensitive and remote areas. It is alarming that issues pertaining to stalking and information control have increased with the growth of technology. This paper presents a Blockchain Technology (BCT) based solution to improve the security and privacy of VC based device data. The proposed design is evaluated by implementing an IoT based application in a virtual vehicle monitoring system. The technical information about the instructions to the vehicle (devices), authentication, integrity, and vehicle reactions are stored in a cloud platform wherein Pentatope based Elliptic curve cryptography and SHA are used to ensure privacy in data storage. The data is later stored in an Ethereum based public blockchain to enable seamless BCT transactions. This system uses the Ganache platform for BCT that ensures data protection and privacy. Furthermore, metamask wallet for Ethbalance is required to perform transactions over BCT. The proposed methodology thus helps to protect data from stalkers, plaintext attacks as well as ciphertext attacks. The results, when compared with the state-of-theart, justify the efficiency and security aspects of the proposed approach.
引用
收藏
页数:11
相关论文
共 55 条
[1]   RETRACTED: Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems (Retracted article. See vol. 128, pg. 568, 2022) [J].
Abdel-Basset, Mohamed ;
Manogaran, Gunasekaran ;
Mohamed, Mai .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :614-628
[2]  
Ajao L. A., 2019, THE J, V2, P300, DOI 10.3390/j2030021
[3]   Blockchain in Industries: A Survey [J].
Al-Jaroodi, Jameela ;
Mohamed, Nader .
IEEE ACCESS, 2019, 7 :36500-36515
[4]  
Almadhoun R, 2018, I C COMP SYST APPLIC
[5]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy, Riham ;
Youssef, Amr M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[6]   3-D Placement of an Unmanned Aerial Vehicle Base Station (UAV-BS) for Energy-Efficient Maximal Coverage [J].
Alzenad, Mohamed ;
El-Keyi, Amr ;
Lagum, Faraj ;
Yanikomeroglu, Halim .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (04) :434-437
[7]   SHARVOT: secret SHARe-based VOTing on the blockchain [J].
Bartolucci, Silvia ;
Bernat, Pauline ;
Joseph, Daniel .
2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON EMERGING TRENDS IN SOFTWARE ENGINEERING FOR BLOCKCHAIN (WETSEB), 2018, :30-34
[8]   Computational System to Classify Cyber Crime Offenses using Machine Learning [J].
Ch, Rupa ;
Gadekallu, Thippa Reddy ;
Abidi, Mustufa Haider ;
Al-Ahmari, Abdulrahman .
SUSTAINABILITY, 2020, 12 (10)
[9]   "Spiders in the Sky": User Perceptions of Drones, Privacy, and Security [J].
Chang, Victoria ;
Chundury, Pramod ;
Chetty, Marshini .
PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, :6765-6776
[10]   An incentive-aware blockchain-based solution for internet of fake media things [J].
Chen, Qian ;
Srivastava, Gautam ;
Parizi, Reza M. ;
Aloqaily, Moayad ;
Al Ridhawi, Ismaeel .
INFORMATION PROCESSING & MANAGEMENT, 2020, 57 (06)