Mohtasin Golam, Rubina Akter, Esmot Ara Tuli, Dong‐Seong Kim, Jae-Min Lee
{"title":"轻量级区块链助力军事物联网防无人机非法访问","authors":"Mohtasin Golam, Rubina Akter, Esmot Ara Tuli, Dong‐Seong Kim, Jae-Min Lee","doi":"10.1109/ICTC55196.2022.9953024","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) offer important strategic advantages in the Internet of Military Things (IoMT). On the other hand, the use of the UAV by an untrusted party may threaten security and perhaps endanger the vital operation of the IoMT network. The IoMT network additionally faces significant challenges from data falsification and manipulation through unauthorised access. For the purpose of addressing these challenges, this research presents a blockchain-based architecture and user authentication mechanism for the purpose of identifying and keeping track of unauthorized UAVs in the IoMT network. Blockchain technology not only stores data on the central control server but also forbids unauthorized access, data manipulation, and illegal intrusions. Additionally, a unique consensus model for UAV communication has been created. By streamlining the resource-constrained mining process, the created consensus can improve the efficiency of blockchain transactions between UAVs.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Lightweight Blockchain Assisted Unauthorized UAV Access Prevention in the Internet of Military Things\",\"authors\":\"Mohtasin Golam, Rubina Akter, Esmot Ara Tuli, Dong‐Seong Kim, Jae-Min Lee\",\"doi\":\"10.1109/ICTC55196.2022.9953024\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unmanned aerial vehicles (UAVs) offer important strategic advantages in the Internet of Military Things (IoMT). On the other hand, the use of the UAV by an untrusted party may threaten security and perhaps endanger the vital operation of the IoMT network. The IoMT network additionally faces significant challenges from data falsification and manipulation through unauthorised access. For the purpose of addressing these challenges, this research presents a blockchain-based architecture and user authentication mechanism for the purpose of identifying and keeping track of unauthorized UAVs in the IoMT network. Blockchain technology not only stores data on the central control server but also forbids unauthorized access, data manipulation, and illegal intrusions. Additionally, a unique consensus model for UAV communication has been created. By streamlining the resource-constrained mining process, the created consensus can improve the efficiency of blockchain transactions between UAVs.\",\"PeriodicalId\":441404,\"journal\":{\"name\":\"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTC55196.2022.9953024\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC55196.2022.9953024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Lightweight Blockchain Assisted Unauthorized UAV Access Prevention in the Internet of Military Things
Unmanned aerial vehicles (UAVs) offer important strategic advantages in the Internet of Military Things (IoMT). On the other hand, the use of the UAV by an untrusted party may threaten security and perhaps endanger the vital operation of the IoMT network. The IoMT network additionally faces significant challenges from data falsification and manipulation through unauthorised access. For the purpose of addressing these challenges, this research presents a blockchain-based architecture and user authentication mechanism for the purpose of identifying and keeping track of unauthorized UAVs in the IoMT network. Blockchain technology not only stores data on the central control server but also forbids unauthorized access, data manipulation, and illegal intrusions. Additionally, a unique consensus model for UAV communication has been created. By streamlining the resource-constrained mining process, the created consensus can improve the efficiency of blockchain transactions between UAVs.