2021
DOI: 10.1007/s11277-021-08214-8
|View full text |Cite
|
Sign up to set email alerts
|

SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…They also addressed the issue of optimal drone positioning to enhance the overall spectral efficiency in the network. Under the same consideration, Andola et al [59] proposed a lightweight blockchain model that provides authentication and anonymity. Their work provides security preferences for a surveillance UAV.…”
Section: B Cybersecuritymentioning
confidence: 99%
“…They also addressed the issue of optimal drone positioning to enhance the overall spectral efficiency in the network. Under the same consideration, Andola et al [59] proposed a lightweight blockchain model that provides authentication and anonymity. Their work provides security preferences for a surveillance UAV.…”
Section: B Cybersecuritymentioning
confidence: 99%
“…A user who requests to consume the services of a certain drone is given access to the keys of the drone to allow the user and drone to communicate in a secure manner. A system for anonymous authorization in IoD was proposed in [9]. The system hides the identities of UAVs within the exchanged message enabling only the receiver to trace back the identity of the sender.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Allowing attackers to steal users' sensitive information or forge wrong data leads to the failure of these applications. Several previous works illustrated that security-related issues in the IoD can be mitigated or resolved with the aid of powerful systems such as the blockchain (BC) [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. The latter, being a distributed immutable database, protects the IoD data using cryptography mechanisms such as public-key encryption and hash functions.…”
Section: Introductionmentioning
confidence: 99%
“…They propose the use of a private blockchain with smart contracts to log the events and actions throughout the task. In terms of results, Cybersecurity Non-repudiation Almotary et al [67] Cybersecurity Non-repudiation Kumari et al [57] Cybersecurity Authentication Cheema et al [31] Cybersecurity Authentication Andola et al [22] Cybersecurity Authentication Hassija et al [43] Reliability Power reliability: recharging/ refueling Jiang et al [48] Reliability Power reliability Qiu et al [73] Reliability Power reliability Pathak et al [68] Reliability Power reliability Gai et al [39] Reliability Power reliability Wu et al [88] Reliability Power reliability Hassija et al [44] Reliability Network connectivity Feng et al [36] Reliability Network connectivity Sharma et al [79] Reliability Network coverage Aloqaily et al [19] Reliability Network connectivity Singh et al [83] Reliability Network connectivity TABLE II LATEST PROPOSALS ON BLOCKCHAIN-ENABLED UAV NETWORKS their simulation revealed that the time overhead of the security protocol increases as the size of the swarm increase, whereas the key creation stage is responsible for the largest delay among other operations.…”
Section: B Cybersecuritymentioning
confidence: 99%
“…They also addressed the issue of optimal drone positioning to enhance the overall spectral efficiency in the network. Under the same consideration, Andola et al [22] proposed a lightweight blockchain model that provides authentication and anonymity. Their work provides security preferences for a surveillance UAV.…”
Section: B Cybersecuritymentioning
confidence: 99%