Concepedia

Publication | Open Access

BUS: A Blockchain-Enabled Data Acquisition Scheme With the Assistance of UAV Swarm in Internet of Things

99

Citations

47

References

2019

Year

TLDR

The study proposes a blockchain‑enabled secure data acquisition scheme that uses a UAV swarm to collect IoT device data and forward it to the nearest server. The UAV swarm first shares a key with IoT devices, receives encrypted data, validates senders with a π‑hash bloom filter and digital signatures, re‑encrypts the data, obtains validator consent before adding it to the blockchain, and stores the data on the blockchain, with security analysis and simulation confirming feasibility. Security analysis and performance results demonstrate that the UAV swarm improves IoT connectivity and energy efficiency while providing protection against the identified threats.

Abstract

This paper presents a blockchain enabled secure data acquisition scheme utilizing an unmanned aerial vehicle (UAV) swarm where data are collected from the Internet of Things (IoT) devices and subsequently, forwarded to the nearest server through the UAV swarm. Before initiating data acquisition, the UAV swarm shares a shared key with the IoT devices in order to maintain communications. However, prior to transmitting data, the IoT devices encrypt the data and forward it to the UAV swarm. Upon receiving the data, the UAV swarm implements a two-phase validation utilizing the π-hash bloom filter and the digital signature algorithm to validate the sender; in addition, prior to forwarding data to the nearest server, it performs encryption. However, before adding data in blockchain, consent from all validators is required. Finally, the data are stored in blockchain with the approval of validators. A security analysis is performed to demonstrate the feasibility of the proposed scheme. Finally, the effectiveness of the proposed scheme is manifested through the implementation and simulation. The security analysis and the performance results show that UAV assist the IoT devices both in terms of connectivity and energy consumption, and provides security against the threats mentioned in the paper.

References

YearCitations

Page 1