2020
DOI: 10.1109/access.2020.3044844
|View full text |Cite
|
Sign up to set email alerts
|

UASTrustChain: A Decentralized Blockchain- Based Trust Monitoring Framework for Autonomous Unmanned Aerial Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…Multicast teams are established for these individuals on the public blockchain [124]. UASTrustChain is a trust management framework for UAV networks where observers maintain the trust score of UAVs in a secure and reliable blockchain ledger to detect abnormal behaviors [125]. Moreover, the integration of blockchain and the Internet of Things (IoT) has resulted in a new paradigm called Blockchain and the Internet of Things (BIoT), in which there are intellectual cores such as data security and privacy, applications, frameworks, etc.…”
Section: Networkingmentioning
confidence: 99%
See 1 more Smart Citation
“…Multicast teams are established for these individuals on the public blockchain [124]. UASTrustChain is a trust management framework for UAV networks where observers maintain the trust score of UAVs in a secure and reliable blockchain ledger to detect abnormal behaviors [125]. Moreover, the integration of blockchain and the Internet of Things (IoT) has resulted in a new paradigm called Blockchain and the Internet of Things (BIoT), in which there are intellectual cores such as data security and privacy, applications, frameworks, etc.…”
Section: Networkingmentioning
confidence: 99%
“…Hashing [82], Public key cryptography [80], Zero-knowledge proofs [84], Post-quantum cryptography [87,88,90], Hybrid cryptography [86,89], fault-tolerant ciphers [91][92][93][94][95] Endpoint attacks 51% vulnerability, cryptojacking [143] Application Smart contracts Contractual automation [116], access control [117] Cryptocurrency Bitcoin [2], Ethereum [81] Supply chain Cold chain management [121] Networking TRUCON [123], IoTChain [124], UASTrustChain [125] Healthcare Drug counterfeiting [127], Medblock [128], MedShare [129] Insurance ClaimChain [130], Insurance fraud protection [131], Decentralized reinsurance [132] Voting PriScore [133], Auditable voting [134] Intellectual property IP protection [135], IP rights management [136] 3. Synopsis of KDN Paradigm…”
Section: Consortium Blockchainmentioning
confidence: 99%
“…Numerous algorithms and analytical models explored in the literature can mitigate these software attacks, but their performance varies depending upon the system models and the types of threats. Table 5 summarizes recent research works [86], [87], [88], [89], [90], [91], [92], [93] carried in the field of secrecy improvement and cyber attack analysis.…”
Section: F Software Installation Threatsmentioning
confidence: 99%
“…To prevent data tampering between RSUs and malicious vehicles, the system selects the miners who generate the blocks through voting among all vehicles. In the context of trust management, the work presented in [27] introduces a trust management framework based on a series of blockchain timestamps, where the behavior of these unmanned aerial vehicles is periodically monitored by a group of distributed observers (DOs). DOs calculate relative trust scores for each UAV and record these scores in a transparent and secure ledger.…”
Section: Introductionmentioning
confidence: 99%