Blockchain envisioned UAV networks: Challenges, solutions, and comparisons

Abstract Unmanned Aerial Vehicles (UAV) or drones is a technology with a huge potential for proving different efficient solutions in the smart city. It has been mostly adopted by military, aviation, civil, and commercial sectors for audio and video surveillance. The communication and security challenges of UAV is well mentioned by researchers and organizations (defense) around the world, although many of the challenges remain unresolved (especially for sensitive and consumer-related applications). Moreover, the conventional network systems may not be very efficient in dealing with the dynamic requirements of UAVs. As the UAVs are generally deployed in tough environments and terrains, therefore it is quite essential to provide a strong and secure network. Motivated from these facts, this paper presents an extensive survey on security issues in 5G-enabled UAV networks as per the literature published till the fourth quarter of 2019. It also presents the taxonomy of existing security issues in 5G-enabled UAV networks. Based on the findings from the survey, we present a Blockchain (BC)-based security solution and a summary of research challenges in the integration of BC with 5G-enabled UAV. Then, we present a case study of implementing BC with UAVs to secure industrial applications.

[1]  Robin R. Murphy,et al.  A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).

[2]  Joel J. P. C. Rodrigues,et al.  Tactile Internet for Smart Communities in 5G: An Insight for NOMA-Based Solutions , 2019, IEEE Transactions on Industrial Informatics.

[3]  Jameela Al-Jaroodi,et al.  Blockchain in Industries: A Survey , 2019, IEEE Access.

[4]  Joel J. P. C. Rodrigues,et al.  An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..

[5]  Rose Qingyang Hu,et al.  Security for 5G Mobile Wireless Networks , 2018, IEEE Access.

[6]  Neeraj Kumar,et al.  Tactile Internet for Autonomous Vehicles: Latency and Reliability Analysis , 2019, IEEE Wireless Communications.

[7]  Joel J. P. C. Rodrigues,et al.  DIYA: Tactile Internet Driven Delay Assessment NOMA-Based Scheme for D2D Communication , 2019, IEEE Transactions on Industrial Informatics.

[8]  J. Archer Harris OPA: a one-time password system , 2002, Proceedings. International Conference on Parallel Processing Workshop.

[9]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[10]  Rizwan Patan,et al.  An Intelligent approach for UAV and Drone Privacy Security Using Blockchain Methodology , 2019, 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[11]  Loretta Ichim,et al.  UAV-to-UAV Communication Options for Civilian Applications , 2018, 2018 26th Telecommunications Forum (TELFOR).

[12]  Sachin Shetty,et al.  Towards data assurance and resilience in IoT using blockchain , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[13]  Andrej Kos,et al.  Approaches to Front-End IoT Application Development for the Ethereum Blockchain , 2017, IIKI.

[14]  Yuefeng Ji,et al.  Blockchain-based trusted authentication in cloud radio over fiber network for 5G , 2017, 2017 16th International Conference on Optical Communications and Networks (ICOCN).

[15]  Ruhul Amin,et al.  Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..

[16]  Ilsun You,et al.  Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain , 2017, MIST@CCS.

[17]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[18]  Jian Shen,et al.  Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services , 2018, IEEE Systems Journal.

[19]  Petar Tsankov,et al.  Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.

[20]  Richard Evans,et al.  Blockchain-based electronic healthcare record system for healthcare 4.0 applications , 2020, J. Inf. Secur. Appl..

[21]  Gabriel-Miro Muntean,et al.  Ultra-Reliable IoT Communications with UAVs: A Swarm Use Case , 2018, IEEE Communications Magazine.

[22]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[23]  Ramjee Prasad,et al.  Jamming attack: Behavioral modelling and analysis , 2013, Wireless VITAE 2013.

[24]  Mário M. Freire,et al.  Challenges of securing Internet of Things devices: A survey , 2018, Secur. Priv..

[25]  Rui Zhang,et al.  Security and Privacy on Blockchain , 2019, ACM Comput. Surv..

[26]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[27]  Zhi Sun,et al.  Modeling and Analysis of Eavesdropping Attack in 802.11ad mmWave Wireless Networks , 2019, IEEE Access.

[28]  Roberto Ferro,et al.  Technical Development of a Security Platform for IoT Based on Blockchain , 2018, KMO.

[29]  Ming Yi,et al.  Overview of 5G security technology , 2017, Science China Information Sciences.

[30]  Jun Li,et al.  Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.

[31]  H. Kakavand,et al.  The Blockchain Revolution: An Analysis of Regulation and Technology Related to Distributed Ledger Technologies , 2017 .

[32]  Divesh Srivastava,et al.  Geofences in the sky: herding drones with blockchains and 5G , 2018, SIGSPATIAL/GIS.

[33]  Soo Young Shin,et al.  BUAV: A blockchain based secure UAV-assisted data acquisition scheme in Internet of Things , 2019, Journal of Communications and Networks.

[34]  Neha Agrawal,et al.  Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges , 2019, IEEE Communications Surveys & Tutorials.

[35]  Mohamed Ayoub Messous,et al.  How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network? , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[36]  Mohammed Atiquzzaman,et al.  Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles , 2017, J. Netw. Comput. Appl..

[37]  Mitch Campion,et al.  A Review and Future Directions of UAV Swarm Communication Architectures , 2018, 2018 IEEE International Conference on Electro/Information Technology (EIT).

[38]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[39]  Jose F. Monserrat,et al.  Trusted 5G Vehicular Networks: Blockchains and Content-Centric Networking , 2018, IEEE Vehicular Technology Magazine.

[40]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[41]  Aleksandr Kapitonov,et al.  Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs , 2017, 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS).

[42]  Jong Hyuk Park,et al.  BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence , 2020, Future Gener. Comput. Syst..

[43]  Jing Chen,et al.  Towards decentralized IoT security enhancement: A blockchain approach , 2018, Comput. Electr. Eng..

[44]  Raouf Boutaba,et al.  Internet of Drones , 2016, IEEE Access.

[45]  Satish Vadlamani,et al.  Jamming attacks on wireless networks: A taxonomic survey , 2016 .

[46]  Mohammad S. Obaidat,et al.  BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[47]  Rahim Rahmani,et al.  Towards Security on Internet of Things: Applications and Challenges in Technology , 2018, EUSPN/ICTH.

[48]  Muhammad Khurram Khan,et al.  An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography , 2015, Journal of Medical Systems.

[49]  Ashiq Anjum,et al.  Blockchain Standards for Compliance and Trust , 2017, IEEE Cloud Computing.

[50]  Thomas Lagkas,et al.  UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things” , 2018, Sensors.

[51]  Sushmita Ruj,et al.  A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT , 2020, J. Netw. Comput. Appl..

[52]  Sherali Zeadally,et al.  A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..

[53]  Eduardo Castelló Ferrer The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.

[54]  Mauro Conti,et al.  Leveraging Blockchain to Enable Smart-Health Applications , 2018, 2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI).

[55]  Yue Wang,et al.  Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G , 2017, IET Commun..

[56]  Silvio Micali,et al.  Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..

[57]  B. B. Zaidan,et al.  Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions , 2019, Comput. Stand. Interfaces.

[58]  Neeraj Kumar,et al.  Fog computing for Healthcare 4.0 environment: Opportunities and challenges , 2018, Comput. Electr. Eng..

[59]  Aakanksha Chowdhery,et al.  SkyEyes: adaptive video streaming from UAVs , 2016, HotWireless@MobiCom.

[60]  Sudeep Tanwar,et al.  Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges , 2020, Mechanical Systems and Signal Processing.

[61]  Wei-Chiang Hong,et al.  Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward , 2020, IEEE Access.

[62]  Xavier Boyen,et al.  Graphchain: a Blockchain-Free Scalable Decentralised Ledger , 2018, BCC '18.

[63]  Sushmita Ruj,et al.  On blockchain-based authorization architecture for beyond-5G mobile services , 2017, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).

[64]  Dushantha Nalin K. Jayakody,et al.  Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks , 2019, IEEE Transactions on Industrial Informatics.

[65]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[66]  Mauro Conti,et al.  A New Secure Data Dissemination Model in Internet of Drones , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[67]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[68]  Stefano Secci,et al.  A tutorial on blockchain and applications to secure network control-planes , 2016, 2016 3rd Smart Cloud Networks & Systems (SCNS).

[69]  Noureddine Boudriga,et al.  A Blockchain based Secure IoT Solution for the Dam Surveillance , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[70]  Neeraj Kumar,et al.  Securing electronics healthcare records in Healthcare 4.0 : A biometric-based approach , 2019, Comput. Electr. Eng..

[71]  Naima Kaabouch,et al.  Detection of GPS Spoofing Attacks on Unmanned Aerial Systems , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[72]  Mohsen Guizani,et al.  Drone-Assisted Public Safety Networks: The Security Aspect , 2017, IEEE Communications Magazine.

[73]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[74]  Yinghui Zhang,et al.  Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice , 2018, J. Netw. Comput. Appl..

[75]  Shashank Tamaskar,et al.  UAV Traffic Information Exchange Network , 2018, 2018 Aviation Technology, Integration, and Operations Conference.

[76]  Sherali Zeadally,et al.  Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries , 2017, IEEE Transactions on Smart Grid.

[77]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[78]  Zhen Wang,et al.  A master-slave blockchain paradigm and application in digital rights management , 2018, China Communications.

[79]  Mohsen Guizani,et al.  Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications , 2018, IEEE Access.

[80]  Wei Ni,et al.  Blockchain's adoption in IoT: The challenges, and a way forward , 2019, J. Netw. Comput. Appl..

[81]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[82]  Pearl Brereton,et al.  Systematic literature reviews in software engineering - A systematic literature review , 2009, Inf. Softw. Technol..

[83]  Shanzhi Chen,et al.  A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain , 2018, IEEE Access.

[84]  Pronaya Bhattacharya,et al.  BloHosT: Blockchain Enabled Smart Tourism and Hospitality Management , 2019, 2019 International Conference on Computer, Information and Telecommunication Systems (CITS).

[85]  Dan York The End of Geography , 2010 .

[86]  Mahalingam Ramkumar,et al.  A blockchain based framework for information system integrity , 2019, China Communications.

[87]  Sudeep Tanwar,et al.  Tactile-Internet-Based Telesurgery System for Healthcare 4.0: An Architecture, Research Challenges, and Future Directions , 2019, IEEE Network.

[88]  Hongming Cai,et al.  Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting , 2018, 2018 5th International Conference on Dependable Systems and Their Applications (DSA).

[89]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[90]  Chenyang Yang,et al.  Ultra-Reliable and Low-Latency Communications in Unmanned Aerial Vehicle Communication Systems , 2019, IEEE Transactions on Communications.

[91]  Mohammad S. Obaidat,et al.  HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0 , 2019, 2019 International Conference on Computer, Information and Telecommunication Systems (CITS).

[92]  Bin Li,et al.  UAV Communications for 5G and Beyond: Recent Advances and Future Trends , 2019, IEEE Internet of Things Journal.

[93]  Salil S. Kanhere,et al.  Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.

[94]  Yu Xu,et al.  Secrecy Energy Efficiency Maximization for UAV-Enabled Mobile Relaying , 2018, IEEE Transactions on Green Communications and Networking.

[95]  Antônio A. de A. Rocha,et al.  A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.

[96]  Ilsun You,et al.  Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives , 2018, Research Briefs on Information and Communication Technology Evolution.

[97]  Lav Gupta,et al.  Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.

[98]  Neeraj Kumar,et al.  Tactile internet and its applications in 5G era: A comprehensive review , 2019, Int. J. Commun. Syst..

[99]  Yi Pan,et al.  Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks , 2019, Symmetry.

[100]  Roberto Riggio,et al.  Blockchain-based Infrastructure Sharing in 5G Small Cell Networks , 2018, 2018 14th International Conference on Network and Service Management (CNSM).

[101]  Prakash Ranganathan,et al.  Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs) , 2019, 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[102]  Walid Saad,et al.  A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems , 2018, IEEE Communications Surveys & Tutorials.

[103]  Giovanni Schembra,et al.  Design of a UAV-Based Videosurveillance System with Tactile Internet Constraints in a 5G Ecosystem , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).

[104]  Muttukrishnan Rajarajan,et al.  Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain , 2019, Ad Hoc Networks.

[105]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[106]  Alexander Kuzmin,et al.  Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles , 2018, 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).

[107]  Hanif Ullah,et al.  5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases , 2019, IEEE Access.

[108]  Pronaya Bhattacharya,et al.  MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions , 2020, Future Gener. Comput. Syst..