Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

26-02-2021

SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD

Authors: Nitish Andola, Raghav, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we have proposed a lightweight blockchain based model to provide distributed authentication and anonymous authorization in IoD. We have proposed four different approaches to hide the identity of unmanned aerial vehicles UAV during the message exchanges using the blockchain. Non Interactive Zero Knowledge Proof (NIZKP) with bilinear map has been used to provide anonymity of UAV on the blockchain. The first approach describes a mechanism for the unlinkability of user identities. The second approach provides resistance against malleability attack together with unlinkability. The third approach ensures sender trackability to the receiver. In the fourth scheme, a UAV can delegate its task of tracking transactions to GCS in such a way that GCS can track the transaction of UAV but cannot claim the transaction’s authority. Relevant proofs of security for Signature Unforgeability and Unlinkability in Ciphertext (UN-C) are given to prove the strength of the techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Choudhary, G., Sharma, V., & You, I. (2019). Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Computers and Electrical Engineering, 74, 59–73.CrossRef Choudhary, G., Sharma, V., & You, I. (2019). Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Computers and Electrical Engineering, 74, 59–73.CrossRef
2.
go back to reference Aggarwal, S., Chaudhary, R., Aujla, G. S., Kumar, N., Choo, K. K. R., & Zomaya, A. Y. (2019). Blockchain for smart communities: Applications, challenges and opportunities. Journal of Network and Computer Applications, 144, 13–48.CrossRef Aggarwal, S., Chaudhary, R., Aujla, G. S., Kumar, N., Choo, K. K. R., & Zomaya, A. Y. (2019). Blockchain for smart communities: Applications, challenges and opportunities. Journal of Network and Computer Applications, 144, 13–48.CrossRef
3.
go back to reference Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N., & Choo, K. K. R. (2019). BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Computers and Security, 85, 288–299.CrossRef Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N., & Choo, K. K. R. (2019). BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Computers and Security, 85, 288–299.CrossRef
4.
go back to reference Feng, Q., He, D., Zeadally, S., & Liang, K. (2019). BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Transactions on Industrial Informatics, 16(6), 4146–4155.CrossRef Feng, Q., He, D., Zeadally, S., & Liang, K. (2019). BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Transactions on Industrial Informatics, 16(6), 4146–4155.CrossRef
5.
go back to reference Alonso, K.M., Monero-Privacy in the blockchain. Alonso, K.M., Monero-Privacy in the blockchain.
6.
go back to reference Jindal, A., Aujla, G. S., & Kumar, N. (2019). SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment. Computer Networks, 153, 36–48.CrossRef Jindal, A., Aujla, G. S., & Kumar, N. (2019). SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment. Computer Networks, 153, 36–48.CrossRef
7.
go back to reference Lin, C., He, D., Huang, X., Xie, X., & Choo, K. K. R. (2020). Blockchain-based system for secure outsourcing of bilinear pairings. Information Sciences, 527, 590–601.MathSciNetCrossRef Lin, C., He, D., Huang, X., Xie, X., & Choo, K. K. R. (2020). Blockchain-based system for secure outsourcing of bilinear pairings. Information Sciences, 527, 590–601.MathSciNetCrossRef
8.
go back to reference Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., & Choo, K. K. R. (2019). Homechain: A blockchain-based secure mutual authentication system for smart homes. IEEE Internet of Things Journal, 7(2), 818–829.CrossRef Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., & Choo, K. K. R. (2019). Homechain: A blockchain-based secure mutual authentication system for smart homes. IEEE Internet of Things Journal, 7(2), 818–829.CrossRef
9.
go back to reference Rodday, N.M., Schmidt, R.D.O., & Pras, A., (2016, April). Exploring security vulnerabilities of unmanned aerial vehicles. In NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium (pp. 993-994). IEEE. Rodday, N.M., Schmidt, R.D.O., & Pras, A., (2016, April). Exploring security vulnerabilities of unmanned aerial vehicles. In NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium (pp. 993-994). IEEE.
10.
go back to reference Enkraouda, H., Barka, E., & Shuaib, K. (2018) Cyber-attacks on the data communication of drones monitoring critical infrastructure. Enkraouda, H., Barka, E., & Shuaib, K. (2018) Cyber-attacks on the data communication of drones monitoring critical infrastructure.
11.
go back to reference Marty, J.A. (2013) Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft (No. AFIT-ENG-14-M-50). Air force institute of technology wright-patterson afb oh graduate school of engineering and management. Marty, J.A. (2013) Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft (No. AFIT-ENG-14-M-50). Air force institute of technology wright-patterson afb oh graduate school of engineering and management.
12.
go back to reference Shoufan, A., AlNoon, H., & Baek, J. (2015, February). Secure communication in civil drones. In International Conference on Information Systems Security and Privacy (pp. 177-195). Springer, Cham. Shoufan, A., AlNoon, H., & Baek, J. (2015, February). Secure communication in civil drones. In International Conference on Information Systems Security and Privacy (pp. 177-195). Springer, Cham.
13.
go back to reference Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., et al. (2019). Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges. IEEE Access, 7, 48572–48634.CrossRef Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., et al. (2019). Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges. IEEE Access, 7, 48572–48634.CrossRef
14.
go back to reference Rajatha, B.S., Ananda, C.M., & Nagaraj, S. (2015, May). Authentication of MAV communication using Caesar Cipher cryptography. In 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) (pp. 58-63). IEEE. Rajatha, B.S., Ananda, C.M., & Nagaraj, S. (2015, May). Authentication of MAV communication using Caesar Cipher cryptography. In 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) (pp. 58-63). IEEE.
15.
go back to reference Hamsavahini, R., Rashmi, N., Varun, N., Swaroop, R. S., Praneeth, V. S., & Narayana, S. (2016). Development of light weight algorithms in a customized communication protocol for micro air vehicles. International Journal of Latest Research in Engineering and Technology, 73–79. Hamsavahini, R., Rashmi, N., Varun, N., Swaroop, R. S., Praneeth, V. S., & Narayana, S. (2016). Development of light weight algorithms in a customized communication protocol for micro air vehicles. International Journal of Latest Research in Engineering and Technology, 73–79.
16.
go back to reference Han, M. (2017). Authentication and Encryption of Aerial Robotics Communication. Han, M. (2017). Authentication and Encryption of Aerial Robotics Communication.
17.
go back to reference Liang, X., Zhao, J., Shetty, S., & Li, D. (2017, October). Towards data assurance and resilience in iot using blockchain. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM) (pp. 261-266). IEEE. Liang, X., Zhao, J., Shetty, S., & Li, D. (2017, October). Towards data assurance and resilience in iot using blockchain. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM) (pp. 261-266). IEEE.
18.
go back to reference Kapitonov, A., Lonshakov, S., Krupenkin, A., & Berman, I. (2017, October). Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs. In 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS) (pp. 84-89). IEEE. Kapitonov, A., Lonshakov, S., Krupenkin, A., & Berman, I. (2017, October). Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs. In 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS) (pp. 84-89). IEEE.
19.
go back to reference Sharma, V., You, I., & Kul, G. (2017, October). Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In Proceedings of the 2017 international workshop on managing insider security threats (pp. 81-84). ACM. Sharma, V., You, I., & Kul, G. (2017, October). Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In Proceedings of the 2017 international workshop on managing insider security threats (pp. 81-84). ACM.
20.
go back to reference Andola, N., Gogoi, M., Venkatesan, S., & Verma, S. (2019). Vulnerabilities on hyperledger fabric. Pervasive and Mobile Computing, 59, 101050.CrossRef Andola, N., Gogoi, M., Venkatesan, S., & Verma, S. (2019). Vulnerabilities on hyperledger fabric. Pervasive and Mobile Computing, 59, 101050.CrossRef
Metadata
Title
SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD
Authors
Nitish Andola
Raghav
Vijay Kumar Yadav
S. Venkatesan
Shekhar Verma
Publication date
26-02-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08214-8

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue