Skip to main content
Erschienen in:

05.09.2024

Blockchain-based cross-domain authentication in a multi-domain Internet of drones environment

verfasst von: Arivarasan Karmegam, Ashish Tomar, Sachin Tripathi

Erschienen in: The Journal of Supercomputing | Ausgabe 19/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As a new paradigm, the Internet of drones (IoD) is making the future easy with its flexibility and wide range of applications. However, these drones are prone to security attacks during communication because of this flexibility. The traditional authentication mechanism uses a centralized server which is a single point of failure to its network and a performance bottleneck. Also, privacy-preserving mechanisms involving a single authority are vulnerable to identity attacks if compromised. Moreover, cross-domain authentication schemes are getting more costly as the security requirements increase. So, this work proposes a blockchain-based cross-domain authentication scheme to make drone communication more secure and efficient. In this work, an elliptic curve digital signature algorithm (ECDSA) based message authentication scheme and a session key generation scheme are modeled. A two-phase pseudonym generation procedure is used to secure the identity of the drones. Hyperledger Fabric is used to implement the blockchain network, and the analysis is done using Hyperledger Caliper. Blockchain analysis through caliper shows the blockchain’s performance for various loads of transactions. Security analysis of the proposed scheme shows that the scheme is secure from various security attacks. The performance analysis shows that the proposed scheme is more lightweight and efficient than most similar authentication schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kumar S, Tiwari P, Zymbler M (2019) Internet of things is a revolutionary approach for future technology enhancement: a review. J Big data 6(1):1–21CrossRef Kumar S, Tiwari P, Zymbler M (2019) Internet of things is a revolutionary approach for future technology enhancement: a review. J Big data 6(1):1–21CrossRef
2.
Zurück zum Zitat Bera B, Das AK, Sutrala AK (2021) Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in internet of drones environment. Comput Commun 166:91–109CrossRef Bera B, Das AK, Sutrala AK (2021) Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in internet of drones environment. Comput Commun 166:91–109CrossRef
3.
Zurück zum Zitat Mozaffari M, Saad W, Bennis M, Nam Y-H, Debbah M (2019) A tutorial on UAVS for wireless networks: applications, challenges, and open problems. IEEE Commun Surv Tutor 21(3):2334–2360CrossRef Mozaffari M, Saad W, Bennis M, Nam Y-H, Debbah M (2019) A tutorial on UAVS for wireless networks: applications, challenges, and open problems. IEEE Commun Surv Tutor 21(3):2334–2360CrossRef
4.
Zurück zum Zitat Chen Y, Chen J (2021) A secure three-factor-based authentication with key agreement protocol for e-health clouds. J Supercomput 77:3359–3380CrossRef Chen Y, Chen J (2021) A secure three-factor-based authentication with key agreement protocol for e-health clouds. J Supercomput 77:3359–3380CrossRef
5.
Zurück zum Zitat Gharibi M, Boutaba R, Waslander SL (2016) Internet of drones. IEEE Access 4:1148–1162CrossRef Gharibi M, Boutaba R, Waslander SL (2016) Internet of drones. IEEE Access 4:1148–1162CrossRef
6.
Zurück zum Zitat Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Gen Comput Syst 91:475–492CrossRef Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Gen Comput Syst 91:475–492CrossRef
7.
Zurück zum Zitat Feng C, Liu B, Guo Z, Yu K, Qin Z, Choo K-KR (2021) Blockchain-based cross-domain authentication for intelligent 5g-enabled internet of drones. IEEE Internet Things J 9(8):6224–6238CrossRef Feng C, Liu B, Guo Z, Yu K, Qin Z, Choo K-KR (2021) Blockchain-based cross-domain authentication for intelligent 5g-enabled internet of drones. IEEE Internet Things J 9(8):6224–6238CrossRef
8.
Zurück zum Zitat Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954CrossRef Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954CrossRef
9.
Zurück zum Zitat Jain S, Doriya R (2022) Security framework to healthcare robots for secure sharing of healthcare data from cloud. Int J Inf Technol 14(5):2429–2439 Jain S, Doriya R (2022) Security framework to healthcare robots for secure sharing of healthcare data from cloud. Int J Inf Technol 14(5):2429–2439
10.
Zurück zum Zitat Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized business review Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized business review
11.
Zurück zum Zitat Abbas S, Talib MA, Ahmed A, Khan F, Ahmad S, Kim D-H (2021) Blockchain-based authentication in internet of vehicles: a survey. Sensors 21(23):7927CrossRef Abbas S, Talib MA, Ahmed A, Khan F, Ahmad S, Kim D-H (2021) Blockchain-based authentication in internet of vehicles: a survey. Sensors 21(23):7927CrossRef
12.
Zurück zum Zitat Jain S, Nandhini C, Doriya R (2021) ECC-based authentication scheme for cloud-based robots. Wirel Pers Commun 117(2):1557–1576CrossRef Jain S, Nandhini C, Doriya R (2021) ECC-based authentication scheme for cloud-based robots. Wirel Pers Commun 117(2):1557–1576CrossRef
13.
Zurück zum Zitat Yang Y, Wei L, Wu J, Long C, Li B (2021) A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet Things J 9(11):8078–8090CrossRef Yang Y, Wei L, Wu J, Long C, Li B (2021) A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet Things J 9(11):8078–8090CrossRef
14.
Zurück zum Zitat Cheng G, Chen Y, Deng S, Gao H, Yin J (2021) A blockchain-based mutual authentication scheme for collaborative edge computing. IEEE Trans Comput Soc Syst 9(1):146–158CrossRef Cheng G, Chen Y, Deng S, Gao H, Yin J (2021) A blockchain-based mutual authentication scheme for collaborative edge computing. IEEE Trans Comput Soc Syst 9(1):146–158CrossRef
15.
Zurück zum Zitat Xu G, Dong J, Ma C, Liu J, Cliff UGO (2022) A certificateless signcryption mechanism based on blockchain for edge computing. IEEE Internet Things J 10(14):11960–11974CrossRef Xu G, Dong J, Ma C, Liu J, Cliff UGO (2022) A certificateless signcryption mechanism based on blockchain for edge computing. IEEE Internet Things J 10(14):11960–11974CrossRef
16.
Zurück zum Zitat Tan Y, Wang J, Liu J, Kato N (2022) Blockchain-assisted distributed and lightweight authentication service for industrial unmanned aerial vehicles. IEEE Internet Things J 9(18):16928–16940CrossRef Tan Y, Wang J, Liu J, Kato N (2022) Blockchain-assisted distributed and lightweight authentication service for industrial unmanned aerial vehicles. IEEE Internet Things J 9(18):16928–16940CrossRef
17.
Zurück zum Zitat Wang W, Xu H, Alazab M, Gadekallu TR, Han Z, Su C (2021) Blockchain-based reliable and efficient certificateless signature for IIOT devices. IEEE Trans Ind Inf 18(10):7059–7067CrossRef Wang W, Xu H, Alazab M, Gadekallu TR, Han Z, Su C (2021) Blockchain-based reliable and efficient certificateless signature for IIOT devices. IEEE Trans Ind Inf 18(10):7059–7067CrossRef
18.
Zurück zum Zitat Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer: New York, pp 452–473 Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer: New York, pp 452–473
19.
Zurück zum Zitat Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption)<< cost (signature)+ cost (encryption). In: Advances in Cryptology-CRYPTO’97: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17–21, 1997 Proceedings, Springer: New York, pp 165–179 Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption)<< cost (signature)+ cost (encryption). In: Advances in Cryptology-CRYPTO’97: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17–21, 1997 Proceedings, Springer: New York, pp 165–179
20.
Zurück zum Zitat Zhang L, Xu J (2022) Blockchain-based anonymous authentication for traffic reporting in vanets. Connect Sci 34(1):1038–1065MathSciNetCrossRef Zhang L, Xu J (2022) Blockchain-based anonymous authentication for traffic reporting in vanets. Connect Sci 34(1):1038–1065MathSciNetCrossRef
22.
Zurück zum Zitat Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques. Springer: New York, pp 417–426 Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques. Springer: New York, pp 417–426
23.
Zurück zum Zitat Yeh K-H, Tsai K-Y, Fan C-Y (2015) An efficient certificateless signature scheme without bilinear pairings. Multimed Tools Appl 74:6519–6530CrossRef Yeh K-H, Tsai K-Y, Fan C-Y (2015) An efficient certificateless signature scheme without bilinear pairings. Multimed Tools Appl 74:6519–6530CrossRef
24.
Zurück zum Zitat Wang L, Chen K, Long Y, Mao X, Wang H (2015) A modified efficient certificateless signature scheme without bilinear pairings. In: 2015 International Conference on Intelligent Networking and Collaborative Systems. IEEE, pp 82–85 Wang L, Chen K, Long Y, Mao X, Wang H (2015) A modified efficient certificateless signature scheme without bilinear pairings. In: 2015 International Conference on Intelligent Networking and Collaborative Systems. IEEE, pp 82–85
25.
Zurück zum Zitat Zhang S, Yan Z, Liang W, Li K-C, Di Martino B (2024) BCAE: a blockchain-based cross domain authentication scheme for edge computing. IEEE Internet Things J Zhang S, Yan Z, Liang W, Li K-C, Di Martino B (2024) BCAE: a blockchain-based cross domain authentication scheme for edge computing. IEEE Internet Things J
26.
Zurück zum Zitat Yasuda M, Shimoyama T, Kogure J, Izu T (2016) Computational hardness of IFP and ECDLP. Appl Algebra Eng Commun Comput 27:493–521MathSciNetCrossRef Yasuda M, Shimoyama T, Kogure J, Izu T (2016) Computational hardness of IFP and ECDLP. Appl Algebra Eng Commun Comput 27:493–521MathSciNetCrossRef
27.
Zurück zum Zitat Maurer U, Wolf S (1998) Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms. In: Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No. 98CH36252). IEEE, p 327 Maurer U, Wolf S (1998) Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms. In: Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No. 98CH36252). IEEE, p 327
28.
Zurück zum Zitat Cui J, Zhu Y, Zhong H, Zhang Q, Gu C, He D (2024) Efficient blockchain-based mutual authentication and session key agreement for cross-domain IIOT. IEEE Internet Things J Cui J, Zhu Y, Zhong H, Zhang Q, Gu C, He D (2024) Efficient blockchain-based mutual authentication and session key agreement for cross-domain IIOT. IEEE Internet Things J
29.
Zurück zum Zitat Luo D, Cai Q, Sun G, Yu H, Niyato D (2024) Split-chain based efficient blockchain-assisted cross-domain authentication for IoT. IEEE Trans Netw Serv Manag Luo D, Cai Q, Sun G, Yu H, Niyato D (2024) Split-chain based efficient blockchain-assisted cross-domain authentication for IoT. IEEE Trans Netw Serv Manag
30.
Zurück zum Zitat Chen Y, Zhang J, Wei X, Wang, Y, et al (2024) Cross-domain authentication scheme for vehicles based on given virtual identities. IEEE Internet Things J Chen Y, Zhang J, Wei X, Wang, Y, et al (2024) Cross-domain authentication scheme for vehicles based on given virtual identities. IEEE Internet Things J
31.
Zurück zum Zitat Kapoor V, Abraham VS, Singh R (2008) Elliptic curve cryptography. Ubiquity 2008(May):1–8CrossRef Kapoor V, Abraham VS, Singh R (2008) Elliptic curve cryptography. Ubiquity 2008(May):1–8CrossRef
32.
Zurück zum Zitat Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp 1–15 Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp 1–15
33.
Zurück zum Zitat Panda SS, Jena D, Mohanta BK, Ramasubbareddy S, Daneshmand M, Gandomi AH (2021) Authentication and key management in distributed IoT using blockchain technology. IEEE Internet Things J 8(16):12947–12954CrossRef Panda SS, Jena D, Mohanta BK, Ramasubbareddy S, Daneshmand M, Gandomi AH (2021) Authentication and key management in distributed IoT using blockchain technology. IEEE Internet Things J 8(16):12947–12954CrossRef
34.
35.
Zurück zum Zitat Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954CrossRef Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954CrossRef
36.
Zurück zum Zitat Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18–36CrossRef Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18–36CrossRef
37.
Zurück zum Zitat Mauw S, Cremers C (2012) Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer, New York Mauw S, Cremers C (2012) Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer, New York
Metadaten
Titel
Blockchain-based cross-domain authentication in a multi-domain Internet of drones environment
verfasst von
Arivarasan Karmegam
Ashish Tomar
Sachin Tripathi
Publikationsdatum
05.09.2024
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 19/2024
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-024-06447-5