2022
DOI: 10.3390/app122010524
|View full text |Cite
|
Sign up to set email alerts
|

Identity Management and Authentication of a UAV Swarm Based on a Blockchain

Abstract: In recent years, with the continuous development of UAV technology, the application of the UAV swarm in the military has been a global focus of research. Although it can bring a series of benefits in autonomous cooperation, the traditional UAV management technology is prone to hacker attacks due to many security issues, such as a single point of failure brought by centralized management and the lack of reliable identity authentication. This paper studies the advantages and the recent advances of the blockchain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 52 publications
0
4
0
1
Order By: Relevance
“…Низька робіт [4][5][6][7][8][9][10] присвячена висвітленню проблем передачі даних у роях БПЛА, моделям та алгоритмам їх вирішення. Проте умови і способи досягнення поставлених цілей обмежуються певними правилами, що не враховують відповідної складності виконання завдання роєм БПЛА на полі бою.…”
Section: вступunclassified
“…Низька робіт [4][5][6][7][8][9][10] присвячена висвітленню проблем передачі даних у роях БПЛА, моделям та алгоритмам їх вирішення. Проте умови і способи досягнення поставлених цілей обмежуються певними правилами, що не враховують відповідної складності виконання завдання роєм БПЛА на полі бою.…”
Section: вступunclassified
“…Recently, blockchain has gained popularity as a distributed, transparent and robust technology that secures, verifies, and records transactions in a safe, transparent, and timely manner [119]. Blockchain offers highly secured, authenticated and trusted services in various applications such as healthcare [120], e-commerce [121], finance [122], supply chain [123], military [124], transportation [125], VANETs [114], unmanned aerial vehicles (UAVs) [126] and IoT [137]. The decentralized nature of blockchain technology makes it a reliable platform for replacing centralized servers in different applications.…”
Section: Blockchain-enabled Hcs-based Ng-iot Systemsmentioning
confidence: 99%
“…However, it does not cover the compromised drone issue, and it requires special hardware. Han et al [30] proposed a blockchain-based UAV swarm identity management model (B-UIM-M). The proposed method has advantages in UAV identity management, UAV identity authentication, scalability, and secure transmission of communication data.…”
Section: Drone Swarm Authentication Protocolmentioning
confidence: 99%
“…These reasons make it necessary to develop a remote identification system for drones, including drone swarms. There have been numerous works on drone identification and authentication methods [18][19][20][21][22][23][24][25], but only a few on authentication methods for drone swarms [26][27][28][29][30]. Also, there is still no effective method of identification for drone swarms.…”
Section: Introductionmentioning
confidence: 99%