Online citations, reference lists, and bibliographies.
← Back to Search

Designing Secure Blockchain-based Access Control Scheme In IoT-enabled Internet Of Drones Deployment

Basudeb Bera, Durbadal Chattaraj, A. K. Das
Published 2020 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Abstract In recent years, the Internet of Drones (IoD) has emerged as an important research topic in the academy and industry because it has several potential applications ranging from the civilian to military. In IoD environment, several drones, called Unmanned Aerial Vehicles (UAVs), are deployed in different flying zones that communicate each other to exchange crucial information, and then the information are collected by the Ground Station Server ( G S S ) . All the drones and the G S S are registered with a central trusted authority, Control Room ( C R ) prior to their deployment. Since the drones and the G S S communicate over open channel (e.g., wireless medium), there are security and privacy issues in the IoD environment. To handle such issues, in this paper we introduce a blockchain-based access control scheme in the IoD environment that allows secure communication among the drones, and also among the drones and the G S S . Secure data gathered by the G S S form transactions, and those transactions are made into the blocks. The blocks are finally added in the blockchain by the cloud servers connected with the G S S via the Ripple Protocol Consensus Algorithm (RPCA) in a peer-to-peer cloud server network. Once the blocks are added into the blockchain, the transactions containing in the blocks cannot be altered, modified or even removed. We provide all sorts of security analysis including formal security under the random oracle model, informal security and simulation-based formal security verification to assure that the proposed scheme can resist various potential attacks with high probability needed in an IoD environment. In addition, a meticulous comparative analysis among the proposed scheme and other closely related existing schemes shows that our scheme offers more functionality attributes and better security, and also low communication and computation costs as compared to other schemes.
This paper references
Digital Signature Standard (DSS)
W. M. Daley (2000)
10.1016/J.COMPELECENG.2019.01.007
Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol
G. Choudhary (2019)
10.1016/0890-5401(91)90001-I
Toward A Theory of Pollard's Rho Method
E. Bach (1991)
10.1109/TII.2019.2948053
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks
Q. Feng (2020)
10.1016/j.ins.2012.04.036
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
A. K. Das (2012)
10.1090/S0025-5718-1987-0866109-5
Elliptic curve cryptosystems
N. Koblitz (1987)
10.1109/JIOT.2018.2846299
Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
Prosanta Gope (2019)
10.1109/MCOM.2017.1700390
Security and Privacy for the Internet of Drones: Challenges and Solutions
Chao Lin (2018)
Cryptography and Network Security: Principles and Practice
W. Stallings (1998)
10.1109/JIOT.2019.2944400
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes
C. Lin (2020)
10.1109/TWC.2015.2473165
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
10.1201/9781439821916
Handbook of Applied Cryptography
A. Menezes (1996)
10.1109/ACCESS.2017.2676119
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S. Challa (2017)
10.1145/571637.571640
Practical byzantine fault tolerance and proactive recovery
Miguel Castro (2002)
10.1016/J.INS.2018.12.043
Blockchain-based system for secure outsourcing of bilinear pairings
Chao Lin (2020)
10.1109/JIOT.2018.2877690
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
A. K. Das (2018)
10.2307/2317055
The art of computer programming. Vol.2: Seminumerical algorithms
D. Knuth (1981)
10.1016/j.csi.2008.05.014
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
10.1016/J.JNCA.2019.06.018
Blockchain for smart communities: Applications, challenges and opportunities
Shubhani Aggarwal (2019)
10.1177/1550147716682037
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
A. Braeken (2016)
On the Elliptic Curve Digital Signature Algorithm
廖宏梓 (2006)
10.1109/ACCESS.2018.2883105
HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform
Durbadal Chattaraj (2018)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1016/J.JISA.2019.06.010
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones
Yifan Tian (2019)
10.1016/j.comcom.2019.10.014
Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges
Shubhani Aggarwal (2020)
10.1145/1880022.1880027
A Simple and Generic Construction of Authenticated Encryption with Associated Data
P. Sarkar (2010)
10.1109/TDSC.2014.2355850
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
10.1016/j.future.2018.06.027
Taxonomy and analysis of security protocols for Internet of Things
A. K. Das (2018)
10.1109/JIOT.2018.2888821
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
M. Wazid (2019)
An Enhanced Access Control Scheme in Wireless Sensor Networks
S. Chatterjee (2014)
Analysis of the XRP Ledger Consensus Protocol
Brad Chase (2018)
10.1002/https://dx.doi.org/10.6028/NIST.FIPS.180-4
Secure Hash Standard | NIST
Q. Dang (2012)
10.1109/JIOT.2019.2931372
Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
Saurav Malani (2019)
10.1109/TIFS.2018.2881730
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids
Prosanta Gope (2019)
10.1561/3300000004
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
B. Blanchet (2016)
10.1109/ACCESS.2019.2909004
An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology
X. Wang (2019)
10.1016/J.COSE.2019.05.006
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system
Rajat Chaudhary (2019)
10.1016/J.COMNET.2019.02.002
SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment
Anish Jindal (2019)
10.1109/TIE.2016.2585081
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
10.1145/357172.357176
The Byzantine Generals Problem
L. Lamport (1982)
10.1016/J.ICTE.2019.08.001
Analysis of the main consensus protocols of blockchain
S. Zhang (2020)
10.1007/S12652-018-1006-X
Authentication protocols for the internet of drones: taxonomy, analysis and future directions
M. Wazid (2018)
10.1504/IJWGS.2018.10016848
Blockchain challenges and opportunities: a survey
Zibin Zheng (2018)
10.1109/TVT.2019.2911672
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
J. Srinivas (2019)
10.1007/978-3-540-70545-1_38
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
C. Cremers (2008)
10.1016/J.ENERGY.2019.05.127
Blockchain-based decentralized and secure keyless signature scheme for smart grid
Hongwei Zhang (2019)
10.1109/TIFS.2018.2850299
Secure Key Agreement and Key Protection for Mobile Device User Authentication
Libing Wu (2019)
10.1109/ACCESS.2019.2936094
A Survey of Blockchain From the Perspectives of Applications, Challenges, and Opportunities
Ahmed Afif Monrat (2019)
10.1155/2018/6140978
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
Ming Luo (2018)
PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake
S. King (2012)
10.1007/BF00196725
Efficient signature generation by smart cards
C. Schnorr (2004)
10.1016/j.comcom.2016.03.007
Practical access control for sensor networks in the context of the Internet of Things
F. Li (2016)
10.1023/A:1008354106356
The State of Elliptic Curve Cryptography
N. Koblitz (2000)
10.1007/s102070100002
The Elliptic Curve Digital Signature Algorithm (ECDSA)
D. Johnson (2001)
10.1109/JIOT.2017.2780232
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
10.1016/j.comnet.2017.12.007
A new two-server authentication and key agreement protocol for accessing secure cloud services
Durbadal Chattaraj (2018)
10.1109/TCE.2010.5505971
On the security of an enhanced novel access control protocol for wireless sensor networks
P. Zeng (2010)
10.1109/TC.2011.221
Efficient Byzantine Fault-Tolerance
G. Veronese (2013)
10.1016/J.IOT.2019.100075
Cryptographic technologies and protocol standards for Internet of Things
S. Zeadally (2019)
10.1016/j.adhoc.2006.05.014
Access control in wireless sensor networks
Yun Zhou (2007)
10.3390/sym11101198
Article A Review of Blockchain Architecture and Consensus Protocols: Use Cases, Challenges, and Solutions
L. Ismail (2019)
10.1109/TDSC.2017.2764083
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
M. Wazid (2020)
10.1155/2011/412146
A New Design of Access Control in Wireless Sensor Networks
Hui-Feng Huang (2011)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1109/TCE.2009.5174412
Enhanced novel access control protocol over wireless sensor networks
Hyun-Sung Kim (2009)



This paper is referenced by
10.1109/TVT.2020.3000576
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
Basudeb Bera (2020)
10.1016/j.csi.2020.103451
Comprehensive survey of UAVs communication networks
Aicha Idriss Hentati (2020)
10.1109/Diagnostika49114.2020.9214756
Utilization of programmable microcontrollers to assess the reliability of alarm systems
M. Boroš (2020)
10.1109/ICC40277.2020.9148915
On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications
Sourav Saha (2020)
10.1109/ACCESS.2020.2992467
A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things
M. Wazid (2020)
10.1002/ett.3995
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment
Sourav Saha (2020)
Design Guidelines for Blockchain-Assisted 5G-UAV Networks
M. Aloqaily (2020)
10.3233/jifs-189351
BIM architecture design from the perspective of smart city and its application in traditional residential design
Yanan Lu (2020)
10.1145/3414045.3415941
Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services
M. Wazid (2020)
10.1109/ACCESS.2020.2995917
BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment
N. Garg (2020)
10.1109/Diagnostika49114.2020.9214584
Importance of electronic access control systems and the need for their testing
M. Boroš (2020)
Semantic Scholar Logo Some data provided by SemanticScholar