Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
Abstract
:1. Introduction
1.1. Research Motivation
1.2. Research Contributions
- A secure blockchain-enabled authentication key management framework with big data analytics for drones in networks beyond 5G applications is proposed. In short, we call it SBBDA-IoD.
- The resilience of SBBDA-IoD against multiple attacks is demonstrated through a security analysis.
- The Scyther tool is used to perform a formal test of SBBDA-IoD’s security, confirming the system’s resistance to a variety of cyber-attacks.
- The comparative analysis found that SBBDA-IoD outperformed the other schemes by a significant margin.
- A real-world implementation of SBBDA-IoD is shown to evaluate its effect on several measures of performance.
2. Related Work
3. System Model
3.1. Network Model
3.2. Threat Model
4. The Proposed Scheme: SBBDA-IoD
4.1. Registration Phase
4.1.1. Registration of Drones
- RGDR1: The generates its identity as and secret key as . It then computes its pseudo-identity as . Then, generates identity for drone as and secret key as . then computes the pseudo-identity of as , temporary one-time identity as and an essential registration parameter as , where is the registration timestamp value of .
- RGDR2: again generates a pseudo-identification number for as . After that, “ selects a non-singular elliptic curve over a finite field” as given below. Suppose there are “2 constants u and v , where and should be a prime”. Again, chooses “a non-singular elliptic curve : over the finite field ”. For instance, “ with a point at infinity or zero point ”. Let G be a base point in with a similar big order like q. then generates a secret key number of as and the associated public parameter as . Finally, stores in the memory of . The drone can then be dispatched to the designated area for use.
- RGDR3: In a similar way, the registration of is performed. Then, contains values like, in its memory.
4.1.2. Registration of Ground Station Servers
- RGGS1: For the registration of , first generates its identity as and secret key as , it then computes the pseudo-identity of as . also computes the public key of as . Furthermore, computes its essential registration parameter as , where is the registration timestamp value of . also securely shares the registration information of drones, i.e., and with by making use of shared master secret key .
- RGGS2: Finally, stores values like, in the database of .
4.1.3. Registration of Cloud Servers
- RGCS1: For the registration of , first generates its identity as and secret key as . After that, produces the pseudo-identity of as . also computes the public key of as .
- RGCS2: Finally, stores values such as in the database of .
4.2. Authentication and Key Establishment Phase
4.2.1. Authentication and Key Establishment between Drone and Drone
- AKADD1: Before starting the process of authentication and key establishment, the drones and share their pseudo-identification number with each other in a secure way. For example, for this task, can send message to . can decrypt and read the value as . In a similar way, can obtain the value of from in a secure way. Furthermore, produces a random secret value and a fresh timestamp value . Then, computes and . After calculating these values sends the message to through an insecure channel.
- AKADD2: When receives from , it first verifies the correctness of by solving the equation , where is the maximum transmission delay and is the time at which was received.Then, computes and . then checks ? If it matches, then is authenticated with . Furthermore, generates a random secret value and a fresh timestamp value . Again, computes . After these calculations, computes its session key as and another important parameter as . then sends message to through an open insecure channel.
- AKADD3: When receives from , it first verifies the correctness of by solving the equation , where is the maximum transmission delay and is the time at which was received. then computes and session key as and . checks ? If it matches, then is authenticated with , and the computed session key by is correct. Again generates another fresh timestamp value and computes and sends message to via open channel.
- AKADD4: When receives from , it first verifies the correctness of by solving the equation , where is the maximum transmission delay and is the time at which was received. Furthermore, computes and checks ? If it matches, then assumes that the session key computed by is correct. Eventually, and establish session key for their secure communication.
4.2.2. Authentication and Key Establishment between Drone and Ground Station Server
- AKADG1: initiates the process with the generation of a random secret parameter (i.e., a variable) and fresh timestamp value . It then computes and . After that, sends the message to via open channel.
- AKADG2: When receives from , it first verifies the correctness of by solving the equation , where is the maximum transmission delay and is the time at which was received. Then, fetches , corresponding to the received . It then computes and . then checks ? If it matches, then is authenticated with . Furthermore, generates a random secret parameter (i.e., a variable) and the fresh timestamp value . It again computes and session key as . After that, computes and a new temporary one time identity as . It again computes . After that sends the message to through an open (insecure) medium.
- AKADG3: When receives from , it first verifies the correctness of by solving the equation , where is the maximum transmission delay and is the time at which was received. It again computes and session key as . After that, computes and checks ? If it matches, then is authenticated with , and the session key computed by is correct. Again, computes its new temporary one-time identity as . generates another fresh timestamp value as and computes . After that, sends message to through the open (insecure) medium.
- AKADG4: When receives from , it first verifies the correctness of by solving the equation , where is the maximum transmission delay and is the time at which was received. It again computes and checks ? If they match, assumes that the session key that came up with is right. In this case, the session key verification works. Eventually, and agree on session key so that they can send data securely.
4.3. Dynamic Device Addition Phase
- DDDR1: generates an identity for drone as and secret key as . then computes the pseudo-identity of as , a temporary one-time identity as and essential registration parameter as , where is the registration timestamp value of .
- DDDR2: again generates a pseudo-identification number for as . then generates a secret key number of as and its corresponding public parameter as . Finally, stores in the memory of . Then, is deployed in the assigned zone as per the requirement. also shares the registration information of drones, i.e., and with the existing in a secure way through shared master secret key .
4.4. Key Management Phase between and
4.5. Blockchain Implementation Phase
4.6. Big Data Analytics Phase
- Secure data collection and processing: Data collection takes on various forms throughout organizations. For example, the data are collected at the in a secure way through the established session key , which is further processed and stored in the blockchain . Here, it is important to mention that the data stored in are protected against various information security-related attacks due to the inherent mechanism of blockchain.
- Cleaning of data: It is vital to clean the data to improve the findings and raise the bar for the data quality maintained in . In order to accomplish this, all of the data need to be presented appropriately, and any redundant or irrelevant material must either be removed or accounted for. Incorrect data can distort the picture and give the wrong impression, which ultimately leads to incorrect insights [29].
- Secure data analysis: This takes time to transform massive amounts of data into a form that is usable. When it is ready, advanced analytic techniques are able to turn massive amounts of data into insightful conclusions, i.e., the data maintained in . The following strategies can be used for analyzing huge data, i.e., “data mining, predictive analysis, and deep learning [30]”. Here, data mining is the process of searching through huge datasets to find patterns and relationships. This is accomplished by locating outliers and forming data clusters. Furthermore, an organization’s historical data are used in predictive analytics to create forecasts about the organization’s future and detect emerging dangers and opportunities. Furthermore, deep learning is a type of earning method that imitates how humans learn by layering algorithms and combining artificial intelligence and machine learning to uncover patterns in the most complex and abstract data [29].
5. Security Analysis of SBBDA-IoD
5.1. SBBDA-IoD Prevents the Replay Attack
5.2. SBBDA-IoD Prevents Man-in-the-Middle (MiTM) and Impersonation Attacks
5.3. SBBDA-IoD Has Resilience against the Privileged Insider Attack
5.4. SBBDA-IoD Is Protected from Stolen Verifier Attack
5.5. SBBDA-IoD Prevents Physical Drone Capture Attack
5.6. SBBDA-IoD Supports Anonymity and Untraceability Properties of Communication
5.7. SBBDA-IoD Is Secured against Ephemeral Secret Leakage (ESL) Attack under the CK-Adversary Model
6. Formal Security Verification of the SBBDA-IoD Using Scyther Tool
7. Performance Comparison
7.1. Comparison of Computation Costs
7.2. Comparison of Communication Costs
7.3. Comparison of Security and Functionality Features
8. Practical Implementation
8.1. Implementation Settings and Environment
8.2. Obtained Results
8.2.1. Accuracy Values
8.2.2. F1-Score Values
8.2.3. Severity Distribution
8.2.4. Scatter Plots
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Gharibi, M.; Boutaba, R.; Waslander, S.L. Internet of Drones. IEEE Access 2016, 4, 1148–1162. [Google Scholar]
- Abdelmaboud, A. The Internet of Drones: Requirements, Taxonomy, Recent Advances, and Challenges of Research Trends. Sensors 2021, 21, 5718. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet Things J. 2019, 6, 3572–3584. [Google Scholar]
- Mozaffari, M.; Taleb Zadeh Kasgari, A.; Saad, W.; Bennis, M.; Debbah, M. Beyond 5G with UAVs: Foundations of a 3D Wireless Cellular Network. IEEE Trans. Wirel. Commun. 2019, 18, 357–372. [Google Scholar]
- Wu, Q.; Xu, J.; Zeng, Y.; Ng, D.W.K.; Al-Dhahir, N.; Schober, R.; Swindlehurst, A.L. A Comprehensive Overview on 5G-and-Beyond Networks With UAVs: From Communications to Sensing and Intelligence. IEEE J. Sel. Areas Commun. 2021, 39, 2912–2945. [Google Scholar] [CrossRef]
- Yahuza, M.; Idris, M.Y.I.; Ahmedy, I.B.; Wahab, A.W.A.; Nandy, T.; Noor, N.M.; Bala, A. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges. IEEE Access 2021, 9, 57243–57270. [Google Scholar]
- Gupta, R.; Bhattacharya, P.; Tanwar, S.; Kumar, N.; Zeadally, S. GaRuDa: A Blockchain-Based Delivery Scheme Using Drones for Healthcare 5.0 Applications. IEEE Internet Things Mag. 2021, 4, 60–66. [Google Scholar] [CrossRef]
- Bera, B.; Wazid, M.; Das, A.K.; Rodrigues, J.J.P.C. Securing Internet of Drones Networks Using AI-Envisioned Smart-Contract-Based Blockchain. IEEE Internet Things Mag. 2021, 4, 68–73. [Google Scholar] [CrossRef]
- Jangirala, S.; Das, A.K.; Vasilakos, A.V. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Trans. Ind. Inform. 2020, 16, 7081–7093. [Google Scholar]
- Dibaei, M.; Zheng, X.; Xia, Y.; Xu, X.; Jolfaei, A.; Bashir, A.K.; Tariq, U.; Yu, D.; Vasilakos, A.V. Investigating the Prospect of Leveraging Blockchain and Machine Learning to Secure Vehicular Networks: A Survey. IEEE Trans. Intell. Transp. Syst. 2022, 23, 683–700. [Google Scholar]
- Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Karimipour, H.; Srivastava, G.; Aledhari, M. Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security. IEEE Internet Things J. 2021, 8, 6406–6415. [Google Scholar] [CrossRef]
- Singh, M.P.; Aujla, G.S.; Bali, R.S. Blockchain for the Internet of Drones: Applications, Challenges, and Future Directions. IEEE Internet Things Mag. 2021, 4, 47–53. [Google Scholar] [CrossRef]
- Ali, Z.; Chaudhry, S.A.; Ramzan, M.S.; Al-Turjman, F. Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles. IEEE Access 2020, 8, 43711–43724. [Google Scholar] [CrossRef]
- Rodrigues, M.; Amaro, J.; Osório, F.S.; Branco Kalinka, R.L.J.C. Authentication Methods for UAV Communication. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June–3 July 2019; pp. 1210–1215. [Google Scholar]
- Kirsal Ever, Y. A Secure Authentication Scheme Framework for Mobile-Sinks used in the Internet of Drones Applications. Comput. Commun. 2020, 155, 143–149. [Google Scholar] [CrossRef]
- Bera, B.; Das, A.K.; Sutrala, A.K. Private Blockchain-Based Access Control Mechanism for Unauthorized UAV Detection and Mitigation in Internet of Drones Environment. Comput. Commun. 2021, 166, 91–109. [Google Scholar] [CrossRef]
- Feng, C.; Liu, B.; Guo, Z.; Yu, K.; Qin, Z.; Choo, K.K.R. Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones. IEEE Internet Things J. 2022, 9, 6224–6238. [Google Scholar] [CrossRef]
- Lwin, K.K.; Sekimoto, Y.; Takeuchi, W.; Zettsu, K. City Geospatial Dashboard: IoT and Big Data Analytics for Geospatial Solutions Provider in Disaster Management. In Proceedings of the IEEE International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), Paris, France, 18–20 December 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Abualigah, L.; Diabat, A.; Sumari, P.; Gandomi, A.H. Applications, Deployments, and Integration of Internet of Drones (IoD): A Review. IEEE Sens. J. 2021, 21, 25532–25546. [Google Scholar] [CrossRef]
- Pu, C.; Wall, A.; Choo, K.K.R.; Ahmed, I.; Lim, S. A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment. IEEE Internet Things J. 2022, 9, 9918–9933. [Google Scholar] [CrossRef]
- Krichen, M.; Lahami, M.; Al–Haija, Q.A. Formal Methods for the Verification of Smart Contracts: A Review. In Proceedings of the 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia, 11–13 November 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Abdellatif, T.; Brousmiche, K.L. Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France; 2018; pp. 1–5. [Google Scholar] [CrossRef] [Green Version]
- Dolev, D.; Yao, A. On the Security of Public Key Protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Canetti, R.; Krawczyk, H. Universally Composable Notions of Key Exchange and Secure Channels. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques– Advances in Cryptology (EUROCRYPT 2002), Amsterdam, The Netherlands, 28 April–2 May 2002; pp. 337–351. [Google Scholar]
- Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Trans. Comput. 2002, 51, 541–552. [Google Scholar] [CrossRef] [Green Version]
- Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Susilo, W. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Depend. Secur. Comput. 2020, 17, 391–406. [Google Scholar] [CrossRef]
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461. [Google Scholar] [CrossRef]
- Wazid, M.; Bera, B.; Das, A.K.; Mohanty, S.P.; Jo, M. Fortifying Smart Transportation Security Through Public Blockchain. IEEE Internet Things J. 2022, 9, 16532–16545. [Google Scholar] [CrossRef]
- Tableau. Big Data Analytics: What It Is, How It Works, Benefits, and Challenges. 2023. Available online: https://www.tableau.com/learn/articles/big-data-analytics (accessed on 5 June 2023).
- Tsai, C.W.; Lai, C.F.; Chao, H.C.; Vasilakos, A.V. Big Data Analytics: A Survey. J. Big Data 2015, 2, 21. [Google Scholar] [CrossRef] [Green Version]
- Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V. Design of Secure Key Management and User Authentication Scheme for Fog Computing Services. Future Gener. Comput. Syst. 2019, 91, 475–492. [Google Scholar] [CrossRef]
- Khadem, B.; Suteh, A.M.; Ahmad, M.; Alkhayyat, A.; Farash, M.S.; Khalifa, H.S. An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions. IEEE Access 2021, 9, 78463–78473. [Google Scholar] [CrossRef]
- Cremers, C.J.F. Scyther: Semantics and Verification of Security Protocols. 2006. Available online: https://pure.tue.nl/ws/files/2425555/200612074.pdf (accessed on 16 November 2022).
- Tanveer, M.; Zahid, A.H.; Ahmad, M.; Baz, A.; Alhakami, H. LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment. IEEE Access 2020, 8, 155645–155659. [Google Scholar] [CrossRef]
- Adeli, M.; Bagheri, N.; Meimani, H.R. On the Designing a Secure Biometric-Based Remote Patient Authentication Scheme for Mobile Healthcare Environments. J. Ambient Intell. Humaniz. Comput. 2021, 12, 3075–3089. [Google Scholar] [CrossRef]
- NIST. Advanced Encryption Standard, 2001, FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce. 2001. Available online: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf (accessed on 6 April 2023).
- Wu, L.; Wang, J.; Choo, K.K.R.; He, D. Secure Key Agreement and Key Protection for Mobile Device User Authentication. IEEE Trans. Inf. Forensics Secur. 2019, 14, 319–330. [Google Scholar] [CrossRef]
- Vangala, A.; Roy, S.; Das, A.K. Blockchain-Based Lightweight Authentication Protocol for IoT-Enabled Smart Agriculture. In Proceedings of the International Conference on Cyber-Physical Social Intelligence (ICCSI), Nanjing, China, 18–21 November 2022; pp. 110–115. [Google Scholar]
- Barker, E. Recommendation for Key Management, 2014. Special Publication 800-57 Part 1 Rev. 4, NIST, 01/2016. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf (accessed on 6 April 2023).
- Seattle. SDOT Collisions All Years. 2023. Available online: https://data.seattle.gov/dataset/SDOT-Collisions-All-Years/79xi-y524 (accessed on 9 June 2023).
Scheme | Technique Used | Features | Disadvantages and Security Flaws |
---|---|---|---|
Ali et al. [13] | A temporal credential-based anonymous lightweight authentication scheme (iTCALAS) | Introduced a temporal credential-based anonymous lightweight authentication scheme (iTCALAS) via lightweight symmetric key primitives. The extended scalability of the iTCALAS that has been presented also allows it to function in an IoD environment with many flying zones or clusters. | It did not have important security and functionality features, i.e., the presence of formal security verification using Scyther tool, support for the blockchain-based solution, support for anonymity and untraceability, and support for big data analytics. Moreover, it was vulnerable to ephemeral secret leakage (ESL) attack under the CK-adversary model. |
Rodrigues et al. [14] | Authentication methods for UAV | They investigated and compared two authentication algorithms designed for WSNs and adapted for use with UAVs. The tests were carried out by examining the amount of time spent executing security-related activities such as hash tables and elliptic curve operations | It did not have important security and functionality features, i.e., the presence of formal security verification using the Scyther tool, the presence of the dynamic drone/device addition phase, support for the blockchain-based solution, and support for big data analytics. Moreover, it was vulnerable to ESL attack under the CK-adversary model. |
Ever [15] | Secure authentication scheme | A safe authentication framework for mobile sinks has been shown which could be utilized in applications for the Internet of Drones. | It did not have important security and functionality features, i.e., the presence of formal security verification using Scyther tool, support dynamic drone/device addition phase, support for the blockchain-based solution, support for anonymity and untraceability, and support for big data analytics. Moreover, it was vulnerable to ESL attack under the CK-adversary model. |
Bera et al. [16] | Private blockchain-based access control mechanism | They presented a technique for access control that may be used in an Internet of Drones (IoD) setting for the purpose of identifying and mitigating the effects of unauthorized UAVs. The transactional data were recorded on a private blockchain that was legitimate and authentic in every way. | It did not have support for the important big data analytics phase. |
Notation | Meaning |
---|---|
and | ith and jth drones |
kth ground station server | |
lth cloud server | |
Control room’s registration authority | |
, , and | Identity, pseudo-identity, and secret key of |
, , and | Identity, pseudo-identity, and secret key of |
Temporary one-time identity of | |
A pseudo-identification number of | |
Essential registration parameter of | |
A non-singular elliptic curve | |
G | A base point in |
A secret key number of | |
Corresponding public parameter of | |
and | Identity and pseudo-identity of |
Secret key of | |
Public key of | |
Essential registration parameter of | |
and | Identity and pseudo-identity of |
Secret key of | |
Public key of | |
An adversary |
Protocol | Smart Device/ Drone | GSS/ Server |
---|---|---|
Ali et al. [13] | ||
Rodrigues et al. [14] | ||
Ever [15] | ||
+ | + | |
Bera et al. [16] | ||
SBBDA-IoD | ||
Protocol | No. of Messages | Total Cost (in Bits) |
---|---|---|
Ali et al. [13] | 3 | 3424 |
Rodrigues et al. [14] | 4 | 3456 |
Ever [15] | 6 | 5344 |
Bera et al. [16] | 3 | 2368 |
SBBDA-IoD | 3 | 1792 |
Feature | Ali et al. [13] | Rodrigues et al. [14] | Ever [15] | Bera et al. [16] | SBBDA-IoD |
---|---|---|---|---|---|
√ | √ | √ | √ | √ | |
√ | √ | √ | √ | √ | |
√ | √ | √ | √ | √ | |
√ | √ | √ | √ | √ | |
√ | √ | √ | √ | √ | |
√ | √ | √ | √ | √ | |
√ | √ | √ | √ | √ | |
√ | √ | √ | √ | √ | |
× | × | × | × | √ | |
× | × | × | √ | √ | |
√ | × | × | √ | √ | |
× | × | × | √ | √ | |
× | √ | √ | √ | √ | |
× | √ | × | √ | √ | |
× | × | × | × | √ |
Parameter | Value |
---|---|
Processor | 2X Intel(R) Xeon(R) CPU @2.20 GHz |
Platform used | Google Colab environment |
Operating system | Ubuntu 18.04.5 LTS |
GPU | 12 GB NVIDIA Tesla K80 |
Random access memory (RAM) size | 13.34 GB |
Number of cloud servers deployed | 2 (not interlinked but elastic) |
Libraries utilized | Shap, Tensorflow, SKLEARN, Pandas |
Used dataset | “SDOT Collisions All Years” dataset [40] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mishra, A.K.; Wazid, M.; Singh, D.P.; Das, A.K.; Singh, J.; Vasilakos, A.V. Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications. Drones 2023, 7, 508. https://doi.org/10.3390/drones7080508
Mishra AK, Wazid M, Singh DP, Das AK, Singh J, Vasilakos AV. Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications. Drones. 2023; 7(8):508. https://doi.org/10.3390/drones7080508
Chicago/Turabian StyleMishra, Amit Kumar, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Jaskaran Singh, and Athanasios V. Vasilakos. 2023. "Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications" Drones 7, no. 8: 508. https://doi.org/10.3390/drones7080508
APA StyleMishra, A. K., Wazid, M., Singh, D. P., Das, A. K., Singh, J., & Vasilakos, A. V. (2023). Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications. Drones, 7(8), 508. https://doi.org/10.3390/drones7080508