Skip to main content
Log in

SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we have proposed a lightweight blockchain based model to provide distributed authentication and anonymous authorization in IoD. We have proposed four different approaches to hide the identity of unmanned aerial vehicles UAV during the message exchanges using the blockchain. Non Interactive Zero Knowledge Proof (NIZKP) with bilinear map has been used to provide anonymity of UAV on the blockchain. The first approach describes a mechanism for the unlinkability of user identities. The second approach provides resistance against malleability attack together with unlinkability. The third approach ensures sender trackability to the receiver. In the fourth scheme, a UAV can delegate its task of tracking transactions to GCS in such a way that GCS can track the transaction of UAV but cannot claim the transaction’s authority. Relevant proofs of security for Signature Unforgeability and Unlinkability in Ciphertext (UN-C) are given to prove the strength of the techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Choudhary, G., Sharma, V., & You, I. (2019). Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Computers and Electrical Engineering, 74, 59–73.

    Article  Google Scholar 

  2. Aggarwal, S., Chaudhary, R., Aujla, G. S., Kumar, N., Choo, K. K. R., & Zomaya, A. Y. (2019). Blockchain for smart communities: Applications, challenges and opportunities. Journal of Network and Computer Applications, 144, 13–48.

    Article  Google Scholar 

  3. Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N., & Choo, K. K. R. (2019). BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Computers and Security, 85, 288–299.

    Article  Google Scholar 

  4. Feng, Q., He, D., Zeadally, S., & Liang, K. (2019). BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Transactions on Industrial Informatics, 16(6), 4146–4155.

    Article  Google Scholar 

  5. Alonso, K.M., Monero-Privacy in the blockchain.

  6. Jindal, A., Aujla, G. S., & Kumar, N. (2019). SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment. Computer Networks, 153, 36–48.

    Article  Google Scholar 

  7. Lin, C., He, D., Huang, X., Xie, X., & Choo, K. K. R. (2020). Blockchain-based system for secure outsourcing of bilinear pairings. Information Sciences, 527, 590–601.

    Article  MathSciNet  Google Scholar 

  8. Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., & Choo, K. K. R. (2019). Homechain: A blockchain-based secure mutual authentication system for smart homes. IEEE Internet of Things Journal, 7(2), 818–829.

    Article  Google Scholar 

  9. Rodday, N.M., Schmidt, R.D.O., & Pras, A., (2016, April). Exploring security vulnerabilities of unmanned aerial vehicles. In NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium (pp. 993-994). IEEE.

  10. Enkraouda, H., Barka, E., & Shuaib, K. (2018) Cyber-attacks on the data communication of drones monitoring critical infrastructure.

  11. Marty, J.A. (2013) Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft (No. AFIT-ENG-14-M-50). Air force institute of technology wright-patterson afb oh graduate school of engineering and management.

  12. Shoufan, A., AlNoon, H., & Baek, J. (2015, February). Secure communication in civil drones. In International Conference on Information Systems Security and Privacy (pp. 177-195). Springer, Cham.

  13. Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., et al. (2019). Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges. IEEE Access, 7, 48572–48634.

    Article  Google Scholar 

  14. Rajatha, B.S., Ananda, C.M., & Nagaraj, S. (2015, May). Authentication of MAV communication using Caesar Cipher cryptography. In 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) (pp. 58-63). IEEE.

  15. Hamsavahini, R., Rashmi, N., Varun, N., Swaroop, R. S., Praneeth, V. S., & Narayana, S. (2016). Development of light weight algorithms in a customized communication protocol for micro air vehicles. International Journal of Latest Research in Engineering and Technology, 73–79.

  16. Han, M. (2017). Authentication and Encryption of Aerial Robotics Communication.

  17. Liang, X., Zhao, J., Shetty, S., & Li, D. (2017, October). Towards data assurance and resilience in iot using blockchain. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM) (pp. 261-266). IEEE.

  18. Kapitonov, A., Lonshakov, S., Krupenkin, A., & Berman, I. (2017, October). Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs. In 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS) (pp. 84-89). IEEE.

  19. Sharma, V., You, I., & Kul, G. (2017, October). Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In Proceedings of the 2017 international workshop on managing insider security threats (pp. 81-84). ACM.

  20. Andola, N., Gogoi, M., Venkatesan, S., & Verma, S. (2019). Vulnerabilities on hyperledger fabric. Pervasive and Mobile Computing, 59, 101050.

    Article  Google Scholar 

Download references

Funding

No funding was received for conducting this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raghav.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary material 1 (xlsx 62 KB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Andola, N., Raghav, Yadav, V.K. et al. SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD. Wireless Pers Commun 119, 343–362 (2021). https://doi.org/10.1007/s11277-021-08214-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08214-8

Keywords

Navigation