A blockchain authentication scheme for UAV-aided fog computing

被引:0
作者
Xiaoyu Du
Song Tao
Ke Yuan
Yinyin Li
Yi Zhou
机构
[1] Henan University,School of Computer and Information Engineering
[2] Henan University,Henan Engineering Laboratory of Spatial Information Processing
[3] Henan University,School of Artificial Intelligence Henan University
来源
Complex & Intelligent Systems | 2024年 / 10卷
关键词
UAV; Blockchain; Fognode; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Unmanned Aerial Vehicle (UAV) swarms not only expanded the application areas of UAVs but also brought more complex challenges to security. Both the data collected by UAVs and UAVs themselves are easy targets for hackers. Once a hacker has intercepted communication information or hijacked a UAV, it can cause the disclosure of information and even affect the normal flight of the UAV. In terms of authentication, existing research focuses on building peer-to-peer networks through devices that support blockchain deployments at the edge nodes to form blockchain networks. UAVs cannot run blockchains directly, so fog nodes need to be introduced to assist UAVs in achieving authentication. This paper proposes a UAV authentication solution based on the fog node-assisted blockchain. The solution incorporates smart contracts to ensure trust, along with on-chain registration and authentication for UAVs. In the design of this paper, the main use is made of fog nodes at the edge of each block. The fog nodes serve as agents to register and authenticate the UAVs in their area on the blockchain, thus enabling the authentication of UAVs in different fog node areas. In this paper, the analysis of gas consumption yields a total economic benefit cost of about ¥\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\yen $$\end{document} 12.77, which is negligible for the safety of the UAVs. Meanwhile, the paper compares the computational overheads, and within 10 UAVs, the computational overhead of this scheme is less than 50 ms, which is significantly lower than the other two schemes.
引用
收藏
页码:1689 / 1702
页数:13
相关论文
共 80 条
[1]  
Alzahrani BA(2020)A privacy preserving authentication scheme for roaming in IoT-based wireless mobile networks” Symmetry 22 2009-2030
[2]  
Chaudhry SA(2020)Blockchain Meets Cloud Computing: A Survey IEEE Communications Surveys & Tutorials 9 156114-156150
[3]  
Barnawi A(2021)A Survey of IoT and Blockchain Integration: Security Perspective IEEE Access 22 2009-2030
[4]  
Al-Barakati A(2020)Blockchain Meets Cloud Computing: A Survey IEEE Communications Surveys & Tutorials 5 24617-24631
[5]  
Alsharif MH(2017)Seamless key agreement framework for mobile-sink in IoT based cloudcentric secured public safety sensor networks IEEE Access 24 134-139
[6]  
Gai K(2016)Communication security of unmanned aerial vehicles IEEE Wireless Commun 69 5391-5402
[7]  
Guo J(2020)A distributed framework for energy trading between UAVs and charging stations for critical applications IEEE Trans Veh Technol 149 51-61
[8]  
Zhu L(2020)Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory Comput Commun 56 64-69
[9]  
Yu S(2018)Security and privacy for the Internet of drones: Challenges and solutions IEEE Commun Mag 154 455-464
[10]  
Shammar EA(2020)A lightweight authentication and key agreement scheme for Internet of drones Comput Commun 68 6903-6916