Identity Management and Authentication of a UAV Swarm Based on a Blockchain
Abstract
:1. Introduction
1.1. Security Issues Faced by UAV Swarm
- Single point of risk brought by centralized management. At present, numerous UAV systems mainly adopt aerial- or ground-layered methods to control UAVs, which are highly centralized. When the management node is destroyed or taken over by the enemy, the control of the entire UAV network will become invalid, affecting the flight and operation of UAVs [14,15,16];
- The lack of reliable authentication mechanisms. Some software bugs or insecure settings may be exploited by enemy drones to invade [17,18]. However, the current drone systems lack reliable identity authentication, which makes it difficult to ensure the authentication and data reliability between UAV nodes;
- Communication link interference and data tampering risk. UAV swarm generally transmits data through wireless channels. The unreliability of the wireless communication environment will seriously affect the interaction between nodes [19,20,21]. At the same time, the UAV terminal capacity is insufficient, and traditional encryption technology and data storage are difficult to use on drone equipment. So, UAVs are particularly vulnerable and tamper-proof, and there is a risk of wireless link monitoring and data theft;
- Difficulty managing drones belonging to different agencies. In typical military applications, it is sometimes necessary for multiple agencies to jointly execute a combat mission. Due to the different management methods, management platforms, and identity authentication methods of different parts, the management of UAVs belonging to different agencies is difficult.
1.2. Blockchain and Related Work
2. Blockchain-Based UAV Swarm Identity Management Model
- The authentication process of the digital certificate is cumbersome. The OCSP (online certificate status protocol) must be asked for each verification of digital certificates, and it needs to update the CRL (certificate revocation list) signed by the CA (certificate authority);
- The identity of the UAV is centrally managed by the owners of the drones or some trusted third parties, which often has a single point of failure and leads to the disclosure of UAV identity information.
- Whether the identity information has been successfully stored in the blockchain;
- Whether the identity information distribution agency is credible, i.e., whether its identity information has been tamper-proof–stored by the blockchain.
- Whether the identity information of the sending agency is credible;
- Whether the information is modified during transmission;
- Whether the identity information is distributed by sending agency.
3. Identity Authentication and Secure Transmission Based on Blockchain
3.1. Secure Transmission of UAV Data Based on Blockchain
- The sender sends message;
- The receiver requests blockchain for identity authentication;
Algorithm 1 Receiver processing information. |
|
- The blockchain responds to request;
Algorithm 2 Blockchain processing information. |
|
3.2. UAV Distributed Identity Authentication Scheme Based on Blockchain
Algorithm 3 Identity authentication processing. |
|
4. Performance Evaluation
4.1. Experimental Method and Environment
4.2. Experimental Settings and Results
4.3. Discussion and Limitations
5. Security Analysis
5.1. Confidentiality
- (1)
- (2)
5.2. Tamper-Proofing
5.3. Other Securities
- The public key endorsed by the sender must be the genuine one belonging to the receiver whose public key is requested by this sender;
- The identity authentication endorsed by the receiver must be the genuine one belonging to the sender whose identity authentication is requested by this receiver.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Gharibi, M.; Boutaba, R.; Waslander, S.L. Internet of drones. IEEE Access 2016, 10, 142–149. [Google Scholar] [CrossRef]
- Lukić, I.; Miličević, K.; Köhler, M.; Vinko, D. Possible Blockchain Solutions According to a Smart City Digitalization Strategy. Appl. Sci. 2022, 12, 5552. [Google Scholar] [CrossRef]
- Kainz, O.; Dopiriak, M.; Michalko, M.; Jakab, F.; Nováková, I. Traffic Monitoring from the Perspective of an Unmanned Aerial Vehicle. Appl. Sci. 2022, 12, 7966. [Google Scholar] [CrossRef]
- Alhelaly, S.; Muthanna, A.; Elgendy, I.A. Optimizing Task Offloading Energy in Multi-User Multi-UAV-Enabled Mobile Edge-Cloud Computing Systems. Appl. Sci. 2022, 12, 6566. [Google Scholar] [CrossRef]
- Arafat, M.Y.; Habib, M.A.; Moh, S. Routing Protocols for UAV-Aided Wireless Sensor Networks. Appl. Sci. 2020, 10, 4077. [Google Scholar] [CrossRef]
- Zhi, Y.; Fu, Z.; Sun, X.; Yu, J. Security and Privacy Issues of UAV: A Survey. Mob. Netw. Appl. 2022, 25, 95–101. [Google Scholar] [CrossRef]
- Tang, J.; Chen, G.; Coon, J.P. Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3026–3041. [Google Scholar] [CrossRef] [Green Version]
- Ch, R.; Srivastava, G.; Gadekallu, T.R.; Maddikunta, P.K.R.; Bhattacharya, S. Security and privacy of UAV data using blockchain technology. J. Inf. Secur. Appl. 2020, 55, 102670. [Google Scholar] [CrossRef]
- Zhou, L.; Yang, Z.; Zhou, S.; Zhang, W. Coverage probability analysis of UAV cellular networks in urban environments. In Proceedings of the 2018 IEEE international conference on communications workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Jiao, S.; Wang, B.; Liu, J.; Liu, R.; Zhou, D. Review of drone swarm research at home and abroad. Aerosp. Electron. Warf. 2019, 35, 61–64. [Google Scholar] [CrossRef]
- Manesh, M.R.; Kaabouch, N. Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions. Comput. Secur. 2019, 85, 386–401. [Google Scholar] [CrossRef]
- Manesh, M.R.; Kaabouch, N. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system. Int. J. Crit. Infrastruct. Prot. 2017, 19, 16–31. [Google Scholar] [CrossRef]
- Sivaraman, V.; Gharakheili, H.H.; Vishwanath, A.; Boreli, R.; Mehani, O. Network-level security and privacy control for smart-home IoT devices. In Proceedings of the 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Abu Dhabi, United Arab Emirates, 19–21 October 2015; pp. 163–167. [Google Scholar] [CrossRef]
- Saraswat, D.; Verma, A.; Bhattacharya, P.; Tanwar, S.; Sharma, G.; Bokoro, P.N.; Sharma, R. Blockchain-Based Federated Learning in UAVs Beyond 5G Networks: A Solution Taxonomy and Future Directions. IEEE Access 2022, 10, 33154–33182. [Google Scholar] [CrossRef]
- Wang, Z.; Zhang, F.; Yu, Q.; Qin, T. Blockchain-Envisioned Unmanned Aerial Vehicle Communications in Space-Air-Ground Integrated Network: A Review. Intell. Converg. Netw. 2021, 2, 277–294. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Krishna, D.N.G.; Guizani, M. A distributed framework for energy trading between UAVs and charging stations for critical applications. IEEE Trans. Veh. Technol. 2020, 69, 5391–5402. [Google Scholar] [CrossRef]
- Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3417–3442. [Google Scholar] [CrossRef] [Green Version]
- Alladi, T.; Chamola, V.; Sahu, N.; Guizani, M. Applications of blockchain in unmanned aerial vehicles: A review. Veh. Commun. 2020, 23, 100249. [Google Scholar] [CrossRef]
- Sultan, L.; Anjum, M.; Rehman, M.; Murawwat, S.; Kosar, H. Communication Among Heterogeneous Unmanned Aerial Vehicles (UAVs): Classification, Trends, and Analysis. IEEE Access 2021, 9, 118815–118836. [Google Scholar] [CrossRef]
- Duan, Z.; Yang, X.; Xu, Q.; Wang, L. Time-Division Multiarray Beamforming for UAV Communication. Wirel. Commun. Mob. Comput. 2022, 2022, 4089931. [Google Scholar] [CrossRef]
- Brito, C.; Silva, L.; Callou, G.; Nguyen, T.A.; Min, D.; Lee, J.-W.; Silva, F.A. Offloading Data through Unmanned Aerial Vehicles: A Dependability Evaluation. Electronics 2021, 10, 1916. [Google Scholar] [CrossRef]
- Soltani, R.; Zaman, M.; Joshi, R.; Sampalli, S. Distributed Ledger Technologies and Their Applications: A Review. Appl. Sci. 2022, 12, 7898. [Google Scholar] [CrossRef]
- Sharma, P.K.; Kumar, N.; Park, J.H. Blockchain-based distributed framework for automotive industry in a smart city. IEEE Trans. Ind. Inform. 2018, 15, 4197–4205. [Google Scholar] [CrossRef]
- Rasool, S.; Saleem, A.; Iqbal, M.; Dagiuklas, T.; Bashir, A.K.; Mumtaz, S.; Al Otaibi, S. Blockchain-enabled reliable osmotic computing for cloud of things: Applications and challenges. IEEE Internet Things Mag. 2020, 3, 63–67. [Google Scholar] [CrossRef]
- Wattana, V.; Tharwon, A.; Danupol, H. When blockchain meets internet of things: Characteristics, challenges, and business opportunities. J. Ind. Inf. Integr. 2019, 15, 21–28. [Google Scholar] [CrossRef]
- Kong, L.; Chen, B.; Hu, F. Blockchain-Assisted Adaptive Reconfiguration Method for Trusted UAV Network. Electronics 2022, 11, 2549. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 6 October 2022).
- Han, P.; Sui, A.; Jiang, T.; Gu, C. Copyright certificate storage and trading system based on blockchain. In Proceedings of the 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), Dalian, China, 25–27 August 2020; pp. 611–615. [Google Scholar] [CrossRef]
- Barateiro, C.; Faria, A.; Farias Filho, J.; Maggessi, K.; Makarovsky, C. Fiscal Measurement and Oil and Gas Production Market: Increasing Reliability Using Blockchain Technology. Appl. Sci. 2022, 12, 7874. [Google Scholar] [CrossRef]
- Liu, F.; Feng, Z.; Qi, J. A Blockchain-Based Digital Asset Platform with Multi-Party Certification. Appl. Sci. 2022, 12, 5342. [Google Scholar] [CrossRef]
- Xi, P.; Zhang, X.; Wang, L.; Liu, W.; Peng, S. A Review of Blockchain-Based Secure Sharing of Healthcare Data. Appl. Sci. 2022, 12, 7912. [Google Scholar] [CrossRef]
- Nguyen, H.P.D.; Nguyen, D.D. Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication. In Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead. Studies in Systems, Decision and Control; Krishnamurthi, R., Nayyar, A., Hassanien, A., Eds.; Springer: Cham, Germany, 2021; Volume 332. [Google Scholar] [CrossRef]
- Górski, T. Reconfigurable Smart Contracts for Renewable Energy Exchange with Re-Use of Verification Rules. Appl. Sci. 2022, 12, 5339. [Google Scholar] [CrossRef]
- Hisseine, M.A.; Chen, D.; Yang, X. The Application of Blockchain in Social Media: A Systematic Literature Review. Appl. Sci. 2022, 12, 6567. [Google Scholar] [CrossRef]
- Feng, W.; Li, Y.; Yang, X.; Yan, Z.; Chen, L. Blockchain-based data transmission control for Tactical Data Link. Digit. Commun. Netw. 2021, 7, 285–294. [Google Scholar] [CrossRef]
- Eyal, I.; Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 2018, 61, 95–102. [Google Scholar] [CrossRef]
- Sapra, R.; Dhaliwal, P. Blockchain: The perspective future of technology. Int. J. Healthc. Inf. Syst. Inform. 2021, 16, 1–20. [Google Scholar] [CrossRef]
- Xu, X.; Zhao, H.; Yao, H.; Wang, S. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT. IEEE Internet Things J. 2020, 8, 2431–2443. [Google Scholar] [CrossRef]
- Al-Jaroodi, J.; Mohamed, N. Blockchain in industries: A survey. IEEE Access 2019, 7, 36500–36515. [Google Scholar] [CrossRef]
- Kumari, A.; Gupta, R.; Tanwar, S.; Kumar, N. A taxonomy of blockchain-enabled softwarization for secure UAV network. Comput. Commun. 2020, 161, 304–323. [Google Scholar] [CrossRef]
- Rana, T.; Shankar, A.; Sultan, M.K.; Patan, R.; Balusamy, B. An intelligent approach for UAV and drone privacy security using blockchain methodology. In Proceedings of the 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 10–11 January 2019; pp. 162–167. [Google Scholar] [CrossRef]
- Lv, Z.; Qiao, L.; Hossain, M.S.; Choi, B.J. Analysis of using blockchain to protect the privacy of drone big data. IEEE Netw. 2021, 35, 44–49. [Google Scholar] [CrossRef]
- Jensen, I.J.; Selvaraj, D.F.; Ranganathan, P. Blockchain technology for networked swarms of unmanned aerial vehicles (UAVs). In Proceedings of the 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Liang, X.; Zhao, J.; Shetty, S.; Li, D. Towards data assurance and resilience in IoT using blockchain. In Proceedings of the MILCOM 2017—2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA, 23–25 October 2017; pp. 261–266. [Google Scholar] [CrossRef]
- Rodríguez-Molina, J.; Corpas, B.; Hirsch, C.; Castillejo, P. SEDIBLOFRA: A Blockchain-Based, Secure Framework for Remote Data Transfer in Unmanned Aerial Vehicles. IEEE Access 2021, 9, 121385–121404. [Google Scholar] [CrossRef]
- Kuzmin, A.; Znak, E. Blockchain-base structures for a secure and operate network of semi-autonomous unmanned aerial vehicles. In Proceedings of the 2018 IEEE International conference on service operations and logistics, and informatics (SOLI), Singapore, 31 July–2 August 2018; pp. 32–37. [Google Scholar] [CrossRef]
- Ge, C.; Ma, X.; Liu, Z. A semi-autonomous distributed blockchain-based framework for UAVs system. J. Syst. Archit. 2020, 107, 101728. [Google Scholar] [CrossRef]
- Mehta, P.; Gupta, R.; Tanwar, S. Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. Comput. Commun. 2020, 151, 518–538. [Google Scholar] [CrossRef]
- Ahmed, W.; Di, W.; Mukathe, D. A Blockchain-Enabled Incentive Trust Management with Threshold Ring Signature Scheme for Traffic Event Validation in VANETs. Sensors 2022, 22, 6715. [Google Scholar] [CrossRef] [PubMed]
- Górski, T. The k + 1 Symmetric Test Pattern for Smart Contracts. Symmetry 2022, 14, 1686. [Google Scholar] [CrossRef]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Luo, G.; Shi, M.; Zhao, C.; Shi, Z. Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs. Appl. Sci. 2020, 10, 4206. [Google Scholar] [CrossRef]
- Firdaus, M.; Rhee, K.-H. On Blockchain-Enhanced Secure Data Storage and Sharing in Vehicular Edge Computing Networks. Appl. Sci. 2021, 11, 414. [Google Scholar] [CrossRef]
- Nieh, B.B.; Tavares, S.E. Modelling and analyzing cryptographic protocols using Petri nets. Int. Workshop Theory Appl. Cryptogr. Tech. 1992, 275–295. [Google Scholar] [CrossRef]
Author | Secure Data Transmission | Distributed Identity Authentication | Type | Identity Information Management | Designed/ Implemented |
---|---|---|---|---|---|
[8] | No | No | Public blockchain | No | Designed and implemented |
[14] | Yes | No | Consortium blockchain | No | Designed and implemented |
[40] | No | No | Public blockchain | No | Designed and implemented |
[41] | No | No | Public blockchain | No | Only designed |
[42] | No | No | Not specified | No | Only designed |
[43] | No | No | Not specified | No | Designed and implemented |
[44] | No | No | Consortium blockchain | No | Only designed |
[45] | Yes | No | Consortium blockchain | No | Designed and implemented |
[46] | No | No | Not specified | No | Designed and implemented |
[47] | Yes | No | Not specified | No | Only designed |
Proposed | Yes | Yes | Consortium blockchain | Yes | Designed and implemented |
UAV Owner | UAV |
---|---|
UAV owner DID that identifies the body of DID document | UAV DID that identifies the body of DID document |
public key information required for authentication, communication establishment and authorization | public key information required for authentication, communication establishment and authorization |
The timestamp of the creation of the DID document | The timestamp of the creation of the DID document |
The timestamp when the DID document was last updated | The timestamp when the DID document was last updated |
DID of the distribution agency | DID of the distribution agency |
Agency name | Physical ID |
Records of important events | Role |
Integrity proof of the DID document, i.e., the signature of its distribution agency | records of important events |
Integrity proof of the DID document, i.e., the signature of its distribution agency |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Han, P.; Sui, A.; Wu, J. Identity Management and Authentication of a UAV Swarm Based on a Blockchain. Appl. Sci. 2022, 12, 10524. https://doi.org/10.3390/app122010524
Han P, Sui A, Wu J. Identity Management and Authentication of a UAV Swarm Based on a Blockchain. Applied Sciences. 2022; 12(20):10524. https://doi.org/10.3390/app122010524
Chicago/Turabian StyleHan, Pengbin, Aina Sui, and Jiang Wu. 2022. "Identity Management and Authentication of a UAV Swarm Based on a Blockchain" Applied Sciences 12, no. 20: 10524. https://doi.org/10.3390/app122010524
APA StyleHan, P., Sui, A., & Wu, J. (2022). Identity Management and Authentication of a UAV Swarm Based on a Blockchain. Applied Sciences, 12(20), 10524. https://doi.org/10.3390/app122010524