Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services

Internet of Drones (IoD) architecture is designed to support a co-ordinated access for the airspace using the unmanned aerial vehicles (UAVs) known as drones. Recently, IoD communication environment is extremely useful for various applications in our daily activities. Artificial intelligence (AI)-enabled Internet of Things (IoT)-based drone-aided healthcare service is a specialized environment which can be used for different types of tasks, for instance, blood and urine samples collections, medicine delivery and for the delivery of other medical needs including the current pandemic of COVID-19. Due to wireless nature of communication among the deployed drones and their ground station server, several attacks (for example, replay, man-in-the-middle, impersonation and privileged-insider attacks) can be easily mounted by malicious attackers. To protect such attacks, the deployment of effective authentication, access control and key management schemes are extremely important in the IoD environment. Furthermore, combining the blockchain mechanism with deployed authentication make it more robust against various types of attacks. To mitigate such issues, we propose a private-blockchain based framework for secure communication in an IoT-enabled drone-aided healthcare environment. The blockchain-based simulation of the proposed framework has been carried out to measure its impact on various performance parameters.

[1]  Mohsen Guizani,et al.  A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact , 2020, IEEE Access.

[2]  Vikas Hassija,et al.  Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory , 2020, Comput. Commun..

[3]  Pascal Lorenz,et al.  Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment , 2020, IEEE Transactions on Vehicular Technology.

[4]  Shalini Batra,et al.  MVO-Based 2-D Path Planning Scheme for Providing Quality of Service in UAV Environment , 2018, IEEE Internet of Things Journal.

[5]  Hanif Ullah,et al.  5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases , 2019, IEEE Access.

[6]  Sherali Zeadally,et al.  Analysis of Security Protocols for Mobile Healthcare , 2016, Journal of Medical Systems.

[7]  Shalini Batra,et al.  Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks , 2019, IEEE Consumer Electronics Magazine.

[8]  Mohsen Guizani,et al.  Applications of blockchain in unmanned aerial vehicles: A review , 2020, Veh. Commun..

[9]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[10]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[11]  Ashok Kumar Das,et al.  Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment , 2020, Comput. Commun..

[12]  Kim-Kwang Raymond Choo,et al.  Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.

[13]  Joel J. P. C. Rodrigues,et al.  TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.

[14]  Luis Javier García Villalba,et al.  Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo , 2019, IEEE Access.

[15]  Athanasios V. Vasilakos,et al.  Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment , 2019, IEEE Internet of Things Journal.

[16]  Athanasios V. Vasilakos,et al.  A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment , 2018, IEEE Journal of Biomedical and Health Informatics.

[17]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[18]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[19]  Xiong Li,et al.  Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS , 2016, Secur. Commun. Networks.

[20]  Jaeyoung Cho,et al.  Drone-Aided Healthcare Services for Patients with Chronic Diseases in Rural Areas , 2017, J. Intell. Robotic Syst..

[21]  Dawn Xiaodong Song,et al.  Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning , 2017, ArXiv.

[22]  Sachin Shetty,et al.  A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things , 2020, IEEE Access.

[23]  Ilsun You,et al.  Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT) , 2018, IEEE Access.

[24]  Laurence T. Yang,et al.  UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles , 2018, IEEE Network.

[25]  Mohsen Guizani,et al.  A Distributed Framework for Energy Trading Between UAVs and Charging Stations for Critical Applications , 2020, IEEE Transactions on Vehicular Technology.

[26]  Hugo Krawczyk,et al.  Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.

[27]  Robert J. Hall,et al.  An Internet of Drones , 2016, IEEE Internet Computing.