Abstract
In this paper, we have proposed a lightweight blockchain based model to provide distributed authentication and anonymous authorization in IoD. We have proposed four different approaches to hide the identity of unmanned aerial vehicles UAV during the message exchanges using the blockchain. Non Interactive Zero Knowledge Proof (NIZKP) with bilinear map has been used to provide anonymity of UAV on the blockchain. The first approach describes a mechanism for the unlinkability of user identities. The second approach provides resistance against malleability attack together with unlinkability. The third approach ensures sender trackability to the receiver. In the fourth scheme, a UAV can delegate its task of tracking transactions to GCS in such a way that GCS can track the transaction of UAV but cannot claim the transaction’s authority. Relevant proofs of security for Signature Unforgeability and Unlinkability in Ciphertext (UN-C) are given to prove the strength of the techniques.
Similar content being viewed by others
References
Choudhary, G., Sharma, V., & You, I. (2019). Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Computers and Electrical Engineering, 74, 59–73.
Aggarwal, S., Chaudhary, R., Aujla, G. S., Kumar, N., Choo, K. K. R., & Zomaya, A. Y. (2019). Blockchain for smart communities: Applications, challenges and opportunities. Journal of Network and Computer Applications, 144, 13–48.
Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N., & Choo, K. K. R. (2019). BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Computers and Security, 85, 288–299.
Feng, Q., He, D., Zeadally, S., & Liang, K. (2019). BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Transactions on Industrial Informatics, 16(6), 4146–4155.
Alonso, K.M., Monero-Privacy in the blockchain.
Jindal, A., Aujla, G. S., & Kumar, N. (2019). SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment. Computer Networks, 153, 36–48.
Lin, C., He, D., Huang, X., Xie, X., & Choo, K. K. R. (2020). Blockchain-based system for secure outsourcing of bilinear pairings. Information Sciences, 527, 590–601.
Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., & Choo, K. K. R. (2019). Homechain: A blockchain-based secure mutual authentication system for smart homes. IEEE Internet of Things Journal, 7(2), 818–829.
Rodday, N.M., Schmidt, R.D.O., & Pras, A., (2016, April). Exploring security vulnerabilities of unmanned aerial vehicles. In NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium (pp. 993-994). IEEE.
Enkraouda, H., Barka, E., & Shuaib, K. (2018) Cyber-attacks on the data communication of drones monitoring critical infrastructure.
Marty, J.A. (2013) Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft (No. AFIT-ENG-14-M-50). Air force institute of technology wright-patterson afb oh graduate school of engineering and management.
Shoufan, A., AlNoon, H., & Baek, J. (2015, February). Secure communication in civil drones. In International Conference on Information Systems Security and Privacy (pp. 177-195). Springer, Cham.
Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., et al. (2019). Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges. IEEE Access, 7, 48572–48634.
Rajatha, B.S., Ananda, C.M., & Nagaraj, S. (2015, May). Authentication of MAV communication using Caesar Cipher cryptography. In 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) (pp. 58-63). IEEE.
Hamsavahini, R., Rashmi, N., Varun, N., Swaroop, R. S., Praneeth, V. S., & Narayana, S. (2016). Development of light weight algorithms in a customized communication protocol for micro air vehicles. International Journal of Latest Research in Engineering and Technology, 73–79.
Han, M. (2017). Authentication and Encryption of Aerial Robotics Communication.
Liang, X., Zhao, J., Shetty, S., & Li, D. (2017, October). Towards data assurance and resilience in iot using blockchain. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM) (pp. 261-266). IEEE.
Kapitonov, A., Lonshakov, S., Krupenkin, A., & Berman, I. (2017, October). Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs. In 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS) (pp. 84-89). IEEE.
Sharma, V., You, I., & Kul, G. (2017, October). Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In Proceedings of the 2017 international workshop on managing insider security threats (pp. 81-84). ACM.
Andola, N., Gogoi, M., Venkatesan, S., & Verma, S. (2019). Vulnerabilities on hyperledger fabric. Pervasive and Mobile Computing, 59, 101050.
Funding
No funding was received for conducting this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Below is the link to the electronic supplementary material.
Rights and permissions
About this article
Cite this article
Andola, N., Raghav, Yadav, V.K. et al. SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD. Wireless Pers Commun 119, 343–362 (2021). https://doi.org/10.1007/s11277-021-08214-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08214-8