A blockchain authentication scheme for UAV-aided fog computing

被引:0
|
作者
Xiaoyu Du
Song Tao
Ke Yuan
Yinyin Li
Yi Zhou
机构
[1] Henan University,School of Computer and Information Engineering
[2] Henan University,Henan Engineering Laboratory of Spatial Information Processing
[3] Henan University,School of Artificial Intelligence Henan University
来源
关键词
UAV; Blockchain; Fognode; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Unmanned Aerial Vehicle (UAV) swarms not only expanded the application areas of UAVs but also brought more complex challenges to security. Both the data collected by UAVs and UAVs themselves are easy targets for hackers. Once a hacker has intercepted communication information or hijacked a UAV, it can cause the disclosure of information and even affect the normal flight of the UAV. In terms of authentication, existing research focuses on building peer-to-peer networks through devices that support blockchain deployments at the edge nodes to form blockchain networks. UAVs cannot run blockchains directly, so fog nodes need to be introduced to assist UAVs in achieving authentication. This paper proposes a UAV authentication solution based on the fog node-assisted blockchain. The solution incorporates smart contracts to ensure trust, along with on-chain registration and authentication for UAVs. In the design of this paper, the main use is made of fog nodes at the edge of each block. The fog nodes serve as agents to register and authenticate the UAVs in their area on the blockchain, thus enabling the authentication of UAVs in different fog node areas. In this paper, the analysis of gas consumption yields a total economic benefit cost of about ¥\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\yen $$\end{document} 12.77, which is negligible for the safety of the UAVs. Meanwhile, the paper compares the computational overheads, and within 10 UAVs, the computational overhead of this scheme is less than 50 ms, which is significantly lower than the other two schemes.
引用
收藏
页码:1689 / 1702
页数:13
相关论文
共 50 条
  • [1] A blockchain authentication scheme for UAV-aided fog computing
    Du, Xiaoyu
    Tao, Song
    Yuan, Ke
    Li, Yinyin
    Zhou, Yi
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (02) : 1689 - 1702
  • [2] A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing
    Wang, Huijuan
    Jiang, Yong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [3] UAV-Aided Edge/Fog Computing in Smart IoT Community for Social Augmented Reality
    Tan, Zhenjie
    Qu, Hua
    Zhao, Jihong
    Zhou, Shiyu
    Wang, Wenjie
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06): : 4872 - 4884
  • [4] UAV-Aided Mobile Edge Computing Systems With One by One Access Scheme
    Hua, Meng
    Wang, Yi
    Li, Chunguo
    Huang, Yongming
    Yang, Luxi
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2019, 3 (03): : 664 - 678
  • [5] A Combinatorial Bandit Approach to UAV-aided Edge Computing
    Wu, Bochun
    Chen, Tianyi
    Wang, Xin
    2020 54TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2020, : 304 - 308
  • [6] Allocation of edge computing tasks for UAV-aided target tracking
    Deng, Xiaoheng
    Li, Jun
    Ma, Ying
    Guan, Peiyuan
    Ding, Haichuan
    COMPUTER COMMUNICATIONS, 2023, 201 : 123 - 130
  • [7] Secure UAV-Aided Mobile Edge Computing for IoT: A Review
    Michailidis, Emmanouel T.
    Maliatsos, Konstantinos
    Skoutas, Dimitrios N.
    Vouyioukas, Demosthenes
    Skianis, Charalabos
    IEEE ACCESS, 2022, 10 : 86353 - 86383
  • [8] Mutual Authentication Security Scheme in Fog Computing
    Rahman, Gohar
    Wen, Chuah Chai
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 443 - 451
  • [9] Optimizing the Operation Cost for UAV-Aided Mobile Edge Computing
    Zhang, Liang
    Ansari, Nirwan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (06) : 6085 - 6093
  • [10] EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
    Eddine, Merzougui Salah
    Ferrag, Mohamed Amine
    Friha, Othmane
    Maglaras, Leandros
    Journal of Information Security and Applications, 2021, 59