Blockchain based peer to peer communication in autonomous drone operation

Abstract With the prevalence of Aerospace Technologies, the regulations of cybersecurity are becoming smarter, assured, and long-lasting. Modern communication network technologies have enormous growth in the cyber threats and masquerading attacks to steal data. Hence concepts and mechanisms are built and made into regulations for a safer environment. Unmanned aerial vehicles (UAVs), often known as drones, are becoming increasingly common, posing new problems in areas such as monitoring, agriculture, weather prediction, surveillance and other fields. This includes a large number of devices that, owing to a lack of energy or a system shutdown, might occasionally send incorrect signals and must be monitored autonomously by drones in remote regions. In this paper, we propose a energy intensive blockchain-based platform for controlling drone operations while ensuring trust and security for all parties involved. The goal of this paper is to explore the extent of Unmanned Aerial Vehicle (UAV) vulnerability to deceptive (Global Navigation Satellite System) GNSS signals by establishing the necessary conditions for UAV via GPS (Global Positioning System) spoofing. The existing algorithms used to mitigate spoofing attacks have unbounded long-term errors, which increase in time during its performance. An innovative idea is necessitating to eliminate those errors, thereby in the proposed work, Ethereum Blockchain has been implemented to create a blockchain network to mitigate the spoofing attacks. Blockchains are incredibly popular nowadays and is the basic technology for cryptocurrencies. Blockchain technology greatly impacts the applications in UAVs. The proposed methodology uses the network that has to be registered in the aerospace components through the ledger associated with relevant data communication in the Blockchain. When an intruder gets acquired with the data in the network with a single block, it cannot affect the entire network due to the data integrity in the ledgers that has been cryptographically assigned. The blockchain network intermittently verifies the geolocation data so that any outlying data would be detected and eliminated quickly. The data that has been verified is made available for the view of aviation and spacecraft operations through the distributed network. The proposed methodology outperforms the existing methods in intense drift error and, in the case of confidentiality and integrity, it has very low risk when compared to existing methods.

[1]  Seng Wai Loke,et al.  Drone services: issues in drones for location-based services from human-drone interaction to information processing , 2019, J. Locat. Based Serv..

[2]  Ren Ping Liu,et al.  Blockchain for Internet of Things , 2020, Blockchains for Network Security.

[3]  Hong Liu,et al.  Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.

[4]  Rick S. Blum,et al.  GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[5]  Artem A. Maksutov,et al.  Detection of Blockchain Transactions Used in Blockchain Mixer of Coin Join Type , 2019, 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[6]  Bernd Eissfeller,et al.  Emerging attacks on VANET security based on GPS Time Spoofing , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[7]  G Padmavathi,et al.  A Comparative Study on Communication Architecture of Unmanned Aerial Vehicles and Security Analysis of False Data Dissemination Attacks , 2018, 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT).

[8]  N. Jhanjhi,et al.  Blockchain for Internet of Things (IoT) Research Issues Challenges & Future Directions: A Review , 2019 .

[9]  Ahmed Serhrouchni,et al.  Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..

[10]  Mansoor Alam,et al.  UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement , 2014, TRIDENTCOM.

[11]  Aleksandr Kapitonov,et al.  Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs , 2017, 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS).

[12]  Mahbub Hassan,et al.  Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges , 2018, IEEE Communications Surveys & Tutorials.

[13]  Ali Dehghantanha,et al.  Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains , 2018, CASCON.

[14]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[15]  Gang Wang,et al.  On the validity of geosocial mobility traces , 2013, HotNets.

[16]  Bo Zhang,et al.  A High Performance Blockchain Platform for Intelligent Devices , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).

[17]  Patrick J. Oonincx,et al.  Exploiting the Doppler effect in GPS to monitor signal integrity and to detect spoofing , 2015, 2015 International Association of Institutes of Navigation World Congress (IAIN).

[18]  Quoc Khanh Nguyen,et al.  Blockchain Technology for the Advancement of the Future , 2018, 2018 4th International Conference on Green Technology and Sustainable Development (GTSD).

[19]  M. M. Puigserver,et al.  Blockchain-Based Contract Signing Protocol for Confidential Contracts , 2019, 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA).

[20]  Gang Qu,et al.  A Privacy-Preserving Trust Model Based on Blockchain for VANETs , 2018, IEEE Access.

[21]  Sahil Verma,et al.  A Novel Patient-Centric Architectural Framework for Blockchain-Enabled Healthcare Applications , 2021, IEEE Transactions on Industrial Informatics.

[22]  Ming Cong,et al.  Detection of GPS spoofing based on UAV model estimation , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.

[23]  Hong Li,et al.  Blockchain for Large-Scale Internet of Things Data Storage and Protection , 2019, IEEE Transactions on Services Computing.

[24]  Guangfu Sun,et al.  A spoofing detection method for motion receiver using single antenna , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).

[25]  Mamoona Humayun,et al.  Emerging Smart Logistics and Transportation Using IoT and Blockchain , 2020, IEEE Internet of Things Magazine.

[26]  Nir Kshetri,et al.  Blockchain in Developing Countries , 2018, IT Professional.

[27]  Todd E. Humphreys,et al.  GNSS Spoofing and Detection , 2016, Proceedings of the IEEE.

[28]  Yuval Elovici,et al.  Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study , 2018, 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID).

[29]  Xianbin Wang,et al.  Detection of GPS spoofing through signal multipath signature analysis , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[30]  Yuxing Zhang,et al.  A Vision-Based GPS-Spoofing Detection Method for Small UAVs , 2017, 2017 13th International Conference on Computational Intelligence and Security (CIS).

[31]  Mohsin Ur Rahman,et al.  Blockchain-based access control management for Decentralized Online Social Networks , 2020, J. Parallel Distributed Comput..

[32]  Anand Nayyar,et al.  RETRACTED ARTICLE: A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology , 2020, Multimedia Tools and Applications.

[33]  Aleksandra Popovska-Mitrovikj,et al.  Analysis of the Possibilities for Improvement of BlockChain Technology , 2018, 2018 26th Telecommunications Forum (TELFOR).

[34]  Jiangtao Wen,et al.  The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.

[35]  Dennis Miller,et al.  Blockchain and the Internet of Things in the Industrial Sector , 2018, IT Professional.

[36]  W. Nowiński,et al.  How Can Blockchain Technology Disrupt the Existing Business Models , 2017 .

[37]  Xin Huang,et al.  A Secure System For Pervasive Social Network-Based Healthcare , 2016, IEEE Access.

[38]  Guohong Cao,et al.  APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.

[39]  Patrick Diamond Detection, mitigation, recovery of GPS based assured timing critical infrastructure when under attack by spoofing or jamming , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).

[40]  Jongwoo An,et al.  Robust Navigational System for a Transporter Using GPS/INS Fusion , 2018, IEEE Transactions on Industrial Electronics.

[41]  Usman Akhtar,et al.  Impact and Detection of GPS Spoofing and Countermeasures against Spoofing , 2019, 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET).

[42]  Shehzad Khalid,et al.  Survey on effective GPS spoofing countermeasures , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).

[43]  Mathieu Joerger,et al.  GPS spoofing detection using RAIM with INS coupling , 2014, 2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014.

[44]  Ming Li,et al.  Location Based Handshake and Private Proximity Test with Location Tags , 2017, IEEE Transactions on Dependable and Secure Computing.

[45]  Sung-Bong Jang,et al.  A Survey of Blockchain and Its Applications , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).

[46]  Ahmad Y. Javaid,et al.  Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation , 2017, Simul..

[47]  Kai-Kit Wong,et al.  Blockchain-Empowered Decentralized Storage in Air-to-Ground Industrial Networks , 2019, IEEE Transactions on Industrial Informatics.

[48]  Shahram Latifi,et al.  Securing the positioning signals of autonomous vehicles , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[49]  Jalel Ben-Othman,et al.  An Investigation on Wannacry Ransomware and its Detection , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).

[50]  Shui Yu,et al.  Blockchain for secure location verification , 2020, J. Parallel Distributed Comput..

[51]  Mathias Weske,et al.  Blockchains for Business Process Management - Challenges and Opportunities , 2017, ACM Trans. Manag. Inf. Syst..

[52]  Naima Kaabouch,et al.  Detection of GPS Spoofing Attacks on Unmanned Aerial Systems , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[53]  Hamid Khaloozadeh,et al.  A New Approach to Estimate True Position of Unmanned Aerial Vehicles in an INS/GPS Integration System in GPS Spoofing Attack Conditions , 2018, Int. J. Autom. Comput..

[54]  R. Katulski,et al.  Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing , 2015 .

[55]  Jalel Ben-Othman,et al.  Sniff‐Phish: A novel framework for resource intensive computation in cloud to detect email scam , 2019, Trans. Emerg. Telecommun. Technol..

[56]  Seng W. Loke,et al.  Enabling Drone Services: Drone Crowdsourcing and Drone Scripting , 2019, IEEE Access.

[57]  Prabaharan Poornachandran,et al.  Spoofing technique to counterfeit the GPS receiver on a drone , 2017, 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy).

[58]  Gang Qu,et al.  Edge Computing based GPS Spoofing Detection Methods , 2018, 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP).