A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network

被引:25
作者
Abualsauod, Emad H. [1 ]
机构
[1] Taibah Univ, Coll Engn, Ind Engn Dept, Al Madina Almonawara 41411, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Blockchain; Privacy; Internet of Things; Unmanned Aerial Vehicles; Security; Industry quality;
D O I
10.1016/j.compeleceng.2022.107847
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicles (UAVs) offer a huge amount of potential in a variety of applications, including healthcare, medical, traffic monitoring, military, and industry. UAVs are deployed in association with the Internet of Things (IoT) to facilitate receivers or end-users at the end for delivering IoT services, resulting in a new research domain. The objectives of this research work are to analyze and classify the peer-reviewed research on UAV IoT frameworks and identify the solution towards challenges related to the overall security including the privacy of the frameworks. In the article, an optimum solution for various security and reliability challenges in UAVenabled IoT applications is given using a fusion of several methods combining blockchain-based technologies. The results are obtained and compared on different parameters like overall system utility, accuracy, latency, and processing time. The proposed methodology results highlight the improvement and give novel directions toward future work.
引用
收藏
页数:13
相关论文
共 30 条
[1]  
Abbasi K., 2019, 2019 UK CHIN EM TECH, P1, DOI [10.1109/UCET.2019.8881879, DOI 10.1109/UCET.2019.8881879]
[2]  
Alladi Tejasvi, 2020, Vehicular Communications, V23, DOI 10.1016/j.vehcom.2020.100249
[3]   UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones [J].
Allouch, Azza ;
Cheikhrouhou, Omar ;
Koubaa, Anis ;
Toumi, Khalifa ;
Khalgui, Mohamed ;
Nguyen Gia, Tuan .
SENSORS, 2021, 21 (09)
[4]  
Awotunde JB, 2021, Hybrid Artificial Intelligence and IoT in Healthcare, P201, DOI 10.1007/978-981-16-2972-310
[5]  
Bettayeb M, 2021, 7 ANN INT C AR WOM C, P1
[6]   Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions [J].
Bhardwaj, Aanshi ;
Mangat, Veenu ;
Vig, Renu ;
Halder, Subir ;
Conti, Mauro .
COMPUTER SCIENCE REVIEW, 2021, 39
[7]   Exposing Computer Generated Images by Eye's Region Classification via Transfer Learning of VGG19 CNN [J].
Carvalho, Tiago ;
de Rezende, Edmar R. S. ;
Alves, Matheus T. P. ;
Balieiro, Fernanda K. C. ;
Sovat, Ricardo B. .
2017 16TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2017, :866-870
[8]   Security and privacy of UAV data using blockchain technology [J].
Ch, Rupa ;
Srivastava, Gautam ;
Gadekallu, Thippa Reddy ;
Maddikunta, Praveen Kumar Reddy ;
Bhattacharya, Sweta .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
[9]  
Cyveillance, 2015, COST PHISH UND TRUE
[10]   OBJECT DETECTION USING NON-REDUNDANT LOCAL BINARY PATTERNS [J].
Duc Thanh Nguyen ;
Zong, Zhimin ;
Ogunbona, Philip ;
Li, Wanqing .
2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, :4609-4612