An Unorthodox Security Framework using Adapted Blockchain Architecture for Internet of Drones

Maninderpal Singh, G. Aujla, R. S. Bali
{"title":"An Unorthodox Security Framework using Adapted Blockchain Architecture for Internet of Drones","authors":"Maninderpal Singh, G. Aujla, R. S. Bali","doi":"10.1109/GCWkshps52748.2021.9682109","DOIUrl":null,"url":null,"abstract":"The evolution of drones from military applications to the consumer world has seen many technological developments. COVID-19 pandemic also witnessed the deployment of drones in a large number of citizen-centric applications. The increasing number of drones and limited operational arena should have a well-suited ecosystem for the success of collaborative operations. As a result, the Internet of Drones (IoD) emerged as a modular framework employing algorithmic coordination of drones. Although these developments have been welcomed they bring along a wide range of security challenges. Drones are highly mobile and they rely on wireless links to communicate among themselves and with the infrastructure. Moreover, they carry a lot of data related to the application where they are deployed. Thus, this brings attention to the security aspects involved in the IoD ecosystem, including various challenges and the mechanisms available to address those challenges. Though several conventional security techniques (like encryption, encoding, and hashing) are already available they are not fully optimized for the IoD environment. This mechanism involves an associated overhead and trade-offs when deployed in the IoD scenario due to limited computational capability of drones. Hence, this brings the necessity to explore alternative security mechanisms like blockchain. However, the conventional blockchain has its limitation of heavy computational primitives (like mining) and may not be useful for the IoD. Hence, we have proposed an unorthodox security framework using an adapted blockchain architecture for IoD. This unorthodox mechanism was validated in a simulated environment and proved to be suitable for the IoD ecosystem.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"17 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCWkshps52748.2021.9682109","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The evolution of drones from military applications to the consumer world has seen many technological developments. COVID-19 pandemic also witnessed the deployment of drones in a large number of citizen-centric applications. The increasing number of drones and limited operational arena should have a well-suited ecosystem for the success of collaborative operations. As a result, the Internet of Drones (IoD) emerged as a modular framework employing algorithmic coordination of drones. Although these developments have been welcomed they bring along a wide range of security challenges. Drones are highly mobile and they rely on wireless links to communicate among themselves and with the infrastructure. Moreover, they carry a lot of data related to the application where they are deployed. Thus, this brings attention to the security aspects involved in the IoD ecosystem, including various challenges and the mechanisms available to address those challenges. Though several conventional security techniques (like encryption, encoding, and hashing) are already available they are not fully optimized for the IoD environment. This mechanism involves an associated overhead and trade-offs when deployed in the IoD scenario due to limited computational capability of drones. Hence, this brings the necessity to explore alternative security mechanisms like blockchain. However, the conventional blockchain has its limitation of heavy computational primitives (like mining) and may not be useful for the IoD. Hence, we have proposed an unorthodox security framework using an adapted blockchain architecture for IoD. This unorthodox mechanism was validated in a simulated environment and proved to be suitable for the IoD ecosystem.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无人机互联网使用改编区块链架构的非正统安全框架
无人机从军事应用到消费领域的演变见证了许多技术的发展。新冠肺炎疫情也见证了无人机在大量以公民为中心的应用中的部署。无人机数量的增加和有限的作战领域应该有一个适合协作作战成功的生态系统。因此,无人机互联网(Internet of Drones, IoD)作为利用无人机算法协调的模块化框架应运而生。尽管这些事态发展受到欢迎,但也带来了广泛的安全挑战。无人机的机动性很强,它们依靠无线链路在它们之间以及与基础设施进行通信。此外,它们还携带大量与部署它们的应用程序相关的数据。因此,这引起了人们对IoD生态系统中涉及的安全方面的关注,包括各种挑战和应对这些挑战的可用机制。尽管已有几种传统的安全技术(如加密、编码和散列)可用,但它们并没有针对IoD环境进行完全优化。由于无人机的计算能力有限,这种机制涉及到在IoD场景中部署时的相关开销和权衡。因此,这带来了探索区块链等替代安全机制的必要性。然而,传统的区块链有其对大量计算原语(如挖掘)的限制,并且可能对IoD没有用处。因此,我们提出了一个非正统的安全框架,使用经过调整的区块链架构用于IoD。这种非正统的机制在模拟环境中得到了验证,并被证明适用于IoD生态系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Blockchain-based Approach for Optimal Energy Dispatch and Fault Reporting in P2P Microgrid Joint Beamforming and BS Selection for Energy-Efficient Communications via Aerial-RIS Security and privacy issues of data-over-sound technologies used in IoT healthcare devices Joint Deployment Design and Power Control for UAV-enabled Covert Communications Leveraging Machine Learning and SDN-Fog Infrastructure to Mitigate Flood Attacks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1