BC-IoDT Blockchain-based Framework for Authentication in Internet of Drone Things

2025-05-06 0 0 5.33MB 6 页 10玖币
侵权投诉
BC-IoDT: Blockchain-based Framework for Authentication in
Internet of Drone Things
Junaid Akram
The University of Sydney
Sydney, Australia
jakr7229@sydney.edu.au
Awais Akram
COMSATS University Islamabad
Vehari, Pakistan
awaisakram1212@gmail.com
Rutvij H. Jhaveri
Pandit Deendayal Energy University
Gujarat , India
rutvij.jhaveri@sot.pdpu.ac.in
Mamoun Alazab
Charles Darwin University
Darwin, Australia
Alazab.m@ieee.org
Haoran Chi
Universidade de Aveiro
Aveiro, Portugal
haoran.chi@ua.pt
ABSTRACT
We leverage blockchain technology for drone node authentication
in internet of drone things (IoDT). During the authentication pro-
cedure, the credentials of drone nodes are examined to remove
malicious nodes from the system. In IoDT, drones are responsible
for gathering data and transmitting it to cluster heads (CHs) for
further processing. The CH collects and organizes data. Due to com-
putational load, their energy levels rapidly deplete. To overcome
this problem, we present a low-energy adaptive clustering hierar-
chy (R2D) protocol based on distance, degree, and residual energy.
R2D is used to replace CHs with normal nodes based on the biggest
residual energy, the degree, and the shortest distance from BS. The
cost of keeping a big volume of data on the blockchain is high. We
employ the Interplanetary File System (IPFS), to address this issue.
Moreover, IPFS protects user data using the industry-standard en-
cryption technique AES-128. This standard compares well to other
current encryption methods. Using a consensus mechanism based
on proof of work requires a high amount of computing resources
for transaction verication. The suggested approach leverages a
consensus mechanism known as proof of authority (PoA) to ad-
dress this problem . The results of the simulations indicate that
the suggested system model functions eectively and eciently. A
formal security analysis is conducted to assess the smart contract’s
resistance to attacks.
CCS CONCEPTS
Security and privacy Authentication;
KEYWORDS
IoDT, Access Control, security, consensus, Cluster Head
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for prot or commercial advantage and that copies bear this notice and the full citation
on the rst page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specic permission and/or a
fee. Request permissions from permissions@acm.org.
DroneCom ’22, October 17, 2022, Sydney, NSW, Australia
©2022 Association for Computing Machinery.
ACM ISBN 978-1-4503-9514-4/22/10. . . $15.00
https://doi.org/10.1145/3555661.3560874
ACM Reference Format:
Junaid Akram, Awais Akram, Rutvij H. Jhaveri, Mamoun Alazab, and Haoran
Chi. 2022. BC-IoDT: Blockchain-based Framework for Authentication in
Internet of Drone Things. In ACM MobiCom Workshop on Drone Assisted
Wireless Communications for 5G and Beyond (DroneCom ’22), October 17,
2022, Sydney, NSW, Australia. ACM, New York, NY, USA, 6 pages. https:
//doi.org/10.1145/3555661.3560874
1 INTRODUCTION
The Internet of drone things (IoDT) refers to the infrastructure
currently being developed to allow anyone to control and access
drones over the internet [
7
]. In reality, drones are becoming more
common consumer commodities, enabling any user to do a range
of tasks in regulated airspace. Despite the fact that technology has
enabled mass manufacture of onboard UAV components like CPUs,
sensors, storage, and battery life, the performance constraints of
these components have decreased expectations[
2
,
8
]. With IoDT,
drones and cloud mobility capabilities may be paired, allowing for
remote access and operation, scalability in ooading, and cloud
storage of data acquired from a great distance.
Because IoDT can gather environmental data, several companies,
such as those dealing with energy trading, surveillance, smart grids,
etc, may prot from it [
11
,
14
,
15
]. It connects to the Internet and
automates the monitoring infrastructure without assistance from
a third party. The drones of the IoDT network are responsible for
environmental monitoring. However, drones in IoDT encounter
obstacles such as non-repudiation, restricted resources, and the exis-
tence of malicious nodes. Numerous solutions [
9
,
13
] are presented
as potential solutions to the aforementioned problems. However,
diculties like single point of failure (SPOF) and performance bot-
tlenecks develop owing to the centralized structure of these studies.
Using blockchain technology, researchers have developed a va-
riety of solutions to remove the need for intermediaries in IoDT,
hence eliminating the aforementioned diculties. Blockchain tech-
nology is a secure, distributed ledger that avoids, among other pos-
sible problems, centralized authority and third-party participation.
Additionally, blockchain’s usage of a distributed and immutable
ledger helps alleviate trust diculties between organizations that
were previously unknown. As a critical component of the network
architecture, miners validate the legitimacy of all transactions con-
ducted by nodes. Miners use several consensus methods, including
proof of work (PoW), proof of authority (PoA), proof of stake, to
arXiv:2210.11745v1 [cs.CR] 21 Oct 2022
DroneCom ’22, October 17, 2022, Sydney, NSW, Australia Akram et al.
validate the authenticity of these transactions. Proof of work (PoW)
and proof of authority (PoA) are two examples. In the PoW method,
each network node contributes to the solution of the mathemati-
cal problem. The rst node to answer the challenge is responsible
for transaction verication. First, the transactions are validated
for correctness before being added to the blockchain. Moreover,
blockchain makes use of smart contracts, the purpose of which is to
nalize all rules and conditions. In addition, it removes the need for
an intermediary. In addition, blockchain ensures network security
by evaluating the trust between nodes, and by detecting malicious
nodes using the Merkle tree [5].
Multiple blockchain-based solutions for scalability concerns,
high costs, and single points of failure have been suggested [
4
].
However, blockchain is a highly expensive storage method, and
all of these networks store their data there. Currently, it costs
$14,151.68 to store one megabyte of data on a blockchain network.
In addition, a proof-of-work consensus mechanism is used in [
4
],
which is inappropriate in a low-resource context.
In the context of IoDT networks, routing refers to the process
by which individual nodes establish connections with one another
and transfer data from its source to its eventual destination. Dier-
ent nodes within the IoDT, including drones, cluster heads (CH),
and base stations (BSs), supervise the transfer of data . It is the
responsibility of the CHs to do any required data processing before
transmitting it to the BSs [
6
,
10
,
12
,
16
]. However, there are no
authenticated network nodes. Since any node may get network
access, any harmful action is conceivable. Moreover, data storage
on a blockchain is costly since no cost-eective storage strategy
is presented in [
6
]. Since blockchains are intended to record trans-
actions in perpetuity, the problem of inadequate capacity to store
these data quickly becomes apparent. In an IoDT conguration,
an excessive energy drain on CHs may also aect network per-
formance. In [
4
], no new CH selection processes are suggested. In
order to add new blocks to the blockchain and validate transactions,
PoW needs miners to solve this problem. This mining procedure
is time-consuming due to the intricacy of the underlying problem,
which increases the network’s computational expenses over time.
The main contributions of this work are as follows:
IPFS is used for IoDT’s distributed storage requirements. A
payment scheme is recommended as an incentive for archival
use of IPFS.
To exclude untrustworthy nodes, each node’s identication
is veried. The suggested LEACH technique, named "R2D",
identies and selects CHs from drones using the least dis-
tance, highest degree, and maximum residual energy.
Blockchain technology is used for secure service provision-
ing systems, with the suggestion that an advanced symmet-
ric encryption technique with a 128-bit key be employed to
protect sensitive data.
For the purpose of determining the validity of the smart
contract, a formal security analysis is undertaken.
The paper moves on to the subsequent sections. In Section 2,
the proposed system model is provided. Section 3 presents the
simulation outcomes and system model validation. In Section 4, the
formal security analysis is addressed. The sixth section provides an
overview of the accomplished activities.
2 SYSTEM MODEL
Figure 1 depicts the system model, which will be analyzed and
reviewed below. IoDT, end-users, the Interplanetary File System
(IPFS), and a blockchain are system components. The ultimate shift
of drones’ backends to IoDT will be enabled by technologies such
as the Internet of Things, intelligent computer vision, cloud com-
puting, enhanced wireless connectivity, big data, and cutting-edge
security. A growing variety of industries are embracing the use of
drones, including agriculture and industry, government and com-
mercial organizations, and the monitoring of smart cities and rural
areas. Each user must register for the blockchain network and
undergo the authentication process to guarantee the network’s
security. This objective is motivated by the usage of registration
and authentication procedures [
4
]. IPFS is a distributed system
that utilizes data and information chunks for storage and retrieval.
Any time information is saved on IPFS, a hash is generated. The
32-bit hash is a result of the IPFS technique for storing data. The
blockchain is then updated with this hash.
2.1 Initialization
A smart contract is a computerized contract whose conditions
may be carried out with little or no requirement for a third party.
Blockchain technology makes this capability possible. It is de-
ployed on the transaction-controlling BSs of the network. Utiliz-
ing blockchain technology, sensor node credentials are kept in a
blockchain for subsequent authentication, as part of the process of
enrolling nodes in the network. The credentials are sent using a
message like the equation shown below.
𝑀𝑒𝑠𝑠𝑎𝑔𝑒 =𝑃𝑎𝑐𝑘𝑒𝑡 (𝐼𝐷𝑁, 𝑀𝐴𝐶𝑁, 𝑅𝑒𝑝𝑁)(1)
Drone Node ID (
𝐼𝐷𝑁
), MAC addresses (
𝑀𝐴𝐶𝑁
), and reputations
(
𝑅𝑒𝑝𝑁
) are utilized as part of the registration and authentication
procedure for nodes.
𝑅𝑒𝑝𝑁
is a measure of a node’s network stand-
ing that takes into account the node’s past behaviors and its con-
nections to other nodes and the rest of the system. If the node’s
reporting is not honest, its reputation will decrease, but if it is, it
will grow. The credentials are recorded in an asymmetrical manner
on a blockchain-based distributed ledger. Their addresses are also
recorded on the blockchain, which provides an additional degree of
security against fraudulent system usage. Throughout the authenti-
cation procedure, the credentials are compared to the information
already on blockchain. When credentials do not match previously
saved data, the node in question is marked as malicious.
2.2 Cluster Head Selection
Drone nodes, cluster heads, and base stations make up the IoDT’s
infrastructure. The drone nodes transmit data to the CHs, where
computations are done. CHs must rst gather drone node data
before relaying it to base stations (BSs). When BS wants to store
data, it makes a request to IPFS, which responds with a hash of the
data. During data processing and storage, the available energy of
CHs is quickly depleted. Our suggested solution to this problem
is based on a technique known as R2D, which chooses CHs from
regular nodes. CHs is determined by three factors: available spare
energy, proximity to BSs, and maximum node degree. If there is
a single node that meets all of the given requirements, it will be
摘要:

BC-IoDT:Blockchain-basedFrameworkforAuthenticationinInternetofDroneThingsJunaidAkramTheUniversityofSydneySydney,Australiajakr7229@sydney.edu.auAwaisAkramCOMSATSUniversityIslamabadVehari,Pakistanawaisakram1212@gmail.comRutvijH.JhaveriPanditDeendayalEnergyUniversityGujarat,Indiarutvij.jhaveri@sot.pdpu...

展开>> 收起<<
BC-IoDT Blockchain-based Framework for Authentication in Internet of Drone Things.pdf

共6页,预览2页

还剩页未读, 继续阅读

声明:本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。玖贝云文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知玖贝云文库,我们立即给予删除!
分类:图书资源 价格:10玖币 属性:6 页 大小:5.33MB 格式:PDF 时间:2025-05-06

开通VIP享超值会员特权

  • 多端同步记录
  • 高速下载文档
  • 免费文档工具
  • 分享文档赚钱
  • 每日登录抽奖
  • 优质衍生服务
/ 6
客服
关注