当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment
Computer Communications ( IF 4.5 ) Pub Date : 2020-12-07 , DOI: 10.1016/j.comcom.2020.12.005
Basudeb Bera , Ashok Kumar Das , Anil Kumar Sutrala

Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or even damage the network reliability that can have direct impact on drones control. This may lead to a potential threat for people, governments, and business sectors. To deal with these issues, in this paper, we propose a novel access control scheme for unauthorized UAV detection and mitigation in an Internet of Drones (IoD) environment, called ACSUD-IoD. With the help of the blockchain-based solution incorporated in ACSUD-IoD, the transactional data having both the normal secure data from a drone (UAV) to the Ground Station Server (GSS) and the abnormal (suspected) data for detection of unauthorized UAVs by the GSS are stored in private blockchain, that are authentic and genuine. As a result, the Big data analytics can be performed on the authenticated transactional data stored in the blockchain. Through the detailed security analysis including formal security under the broadly-accepted Real-Or-Random (ROR) model, formal security verification using the widely-applied Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and non-mathematical security analysis show the robustness of the proposed scheme against a number of potential attacks needed in an IoD environment. The testbed experiments for various cryptographic primitives using the broadly-accepted Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) have been performed under both server and Raspberry PI 3 configurations. Furthermore, a detailed comparative analysis among the proposed scheme and other existing competing schemes shows the efficacy and more robustness as compared to the existing schemes. Finally, the blockchain-based practical demonstration shows the effectiveness of the proposed scheme.



中文翻译:

基于私有区块链的访问控制机制,可在无人机互联网环境中进行未经授权的无人机检测和缓解

无人机,也称为无人飞行器(UAV),在交付包裹,实时目标检测和跟踪时,对人类的干扰最小,非常有用。但是,在这种环境中可能会存在多种安全威胁,例如,恶意用户可以监视未经授权的无人机,传输恶意软件包,甚至破坏可能直接影响无人机控制的网络可靠性。这可能会对人员,政府和商业部门造成潜在威胁。为了解决这些问题,在本文中,我们提出了一种新颖的访问控制方案,用于无人驾驶无人机(IoD)环境中的未经授权的无人机检测和缓解,称为ACSUD-IoD。借助ACSUD-IoD中基于区块链的解决方案,G小号小号 以及用于检测未经授权的无人机的异常(可疑)数据 G小号小号存储在真实和真实的私有区块链中。结果,可以对存储在区块链中的经过身份验证的交易数据执行大数据分析。通过详细的安全性分析,包括在广泛接受的“随机或随机”(ROR)模式下进行的正式安全性,使用广泛应用的Internet安全协议和应用程序自动验证(AVISPA)工具进行的正式安全性验证以及非数学安全性分析针对IoD环境中所需的多种潜在攻击,所提方案的鲁棒性。使用服务器和Raspberry PI 3配置在广泛接受的Multiprecision Integer和Rational Arithmetic Cryptographic Library(MIRACL)下对各种密码原语进行了测试平台实验。此外,与现有方案相比,对拟议方案与其他现有竞争方案进行的详细比较分析显示出了有效性和更强的鲁棒性。最后,基于区块链的实践演示证明了该方案的有效性。

更新日期:2020-12-10
down
wechat
bug