Publication | Open Access
BUS: A Blockchain-Enabled Data Acquisition Scheme With the Assistance of UAV Swarm in Internet of Things
99
Citations
47
References
2019
Year
Hardware SecurityUav Swarm SharesEngineeringAuthentication ProtocolInformation SecurityIot CommunicationData AcquisitionBlockchain SecurityUav SwarmData PrivacyBlockchain ProtocolIot SecurityInternet Of ThingsSecure ProtocolBlockchainCybersecurity ProtocolsData SecurityCryptography
The study proposes a blockchain‑enabled secure data acquisition scheme that uses a UAV swarm to collect IoT device data and forward it to the nearest server. The UAV swarm first shares a key with IoT devices, receives encrypted data, validates senders with a π‑hash bloom filter and digital signatures, re‑encrypts the data, obtains validator consent before adding it to the blockchain, and stores the data on the blockchain, with security analysis and simulation confirming feasibility. Security analysis and performance results demonstrate that the UAV swarm improves IoT connectivity and energy efficiency while providing protection against the identified threats.
This paper presents a blockchain enabled secure data acquisition scheme utilizing an unmanned aerial vehicle (UAV) swarm where data are collected from the Internet of Things (IoT) devices and subsequently, forwarded to the nearest server through the UAV swarm. Before initiating data acquisition, the UAV swarm shares a shared key with the IoT devices in order to maintain communications. However, prior to transmitting data, the IoT devices encrypt the data and forward it to the UAV swarm. Upon receiving the data, the UAV swarm implements a two-phase validation utilizing the π-hash bloom filter and the digital signature algorithm to validate the sender; in addition, prior to forwarding data to the nearest server, it performs encryption. However, before adding data in blockchain, consent from all validators is required. Finally, the data are stored in blockchain with the approval of validators. A security analysis is performed to demonstrate the feasibility of the proposed scheme. Finally, the effectiveness of the proposed scheme is manifested through the implementation and simulation. The security analysis and the performance results show that UAV assist the IoT devices both in terms of connectivity and energy consumption, and provides security against the threats mentioned in the paper.
| Year | Citations | |
|---|---|---|
Page 1
Page 1