ETRI-Knowledge Sharing Plaform



논문 검색
구분 SCI
연도 ~ 키워드


학술지 LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks
Cited 5 time in scopus Download 16 time Share share facebook twitter linkedin kakaostory
유성진, 이준영, Anil Kumar Sutrala, Ashok Kumar Das, 박영호
Computer Networks, v.224, pp.1-15
Elsevier BV
23ZR1300, 지능형 사이버 보안 및 신뢰 인프라 기술 연구, 김정녀
Unmanned Aerial Vehicle (UAV) can be employed in various applications, including traffic control, and delivery application. However, these services are susceptible to various security attacks because sensitive data are exchanged through an open channel. Thus, a secure authentication scheme is essential for UAV. UAV has limited storage resources and computing capabilities. To overcome these problems, cloud computing is considered as a promising solution. Cloud computing provides various properties such as storage availability and scalability. Unfortunately, the cloud server's database can be a major target for an adversary because it is a centralized system. If an adversary intrudes on the cloud server's database, he/she may attempt to intercept or learn the stored data. To mitigate these issues, we design a secure and lightweight authentication and key agreement scheme for cloud-assisted UAV using blockchain in flying ad-hoc networks, called LAKA-UAV. LAKA-UAV utilizes blockchain technology to ensure access control and data integrity using log transactions and the cloud server securely manages collected data from UAV. We prove the security of LAKA-UAV based on informal security analysis and formal security verification implementation. Based on testbed experiments using MIRACL, LAKA-UAV provides about 2.13 times more efficient performance on average compared with related schemes in terms of computation. We present the blockchain implementation using Hyperledger Sawtooth platform.
KSP 제안 키워드
BlockChain, Cloud Computing, Cloud server, Cloud-assisted, Data Integrity, Flying Ad Hoc Networks(FANET), Secure authentication, Security attacks, Sensitive Data, Traffic control, Various properties