Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure

Ezedin Barka, Chaker Abdelaziz Kerrache, Hadjer Benkraouda, Khaled Shuaib, Farhan Ahmad, Fatih Kurugollu

Research output: Contribution to journalArticlepeer-review

15 Citations (Scopus)

Abstract

With the exponential growth in the number of vital infrastructures such as nuclear plants and transport and distribution networks, these systems have become more susceptible to coordinated cyberattacks. One of the effective approaches used to strengthen the security of these infrastructures is the use of unmanned aerial vehicles (UAVs) for surveillance and data collection. However, UAVs themselves are prone to attacks on their collected sensor data. Recently, blockchain (BC) has been proposed as a revolutionary technology that can be integrated within Internet of things (IoT) to provide a desired level of security and privacy. However, the integration of BC within IoT networks, where UAV's sensors constitute a major component, is extremely challenging. The major contribution of this study is twofold:(1) survey the security issues for UAV's collected sensor data, define the security requirements for such systems, and identify ways to address them; and (2) propose a novel BC-based solution to ensure the security of and the trust between the UAVs and their relevant ground control stations. Our implementation results and analysis show that using UAVs as means for protecting critical infrastructure is greatly enhanced through the utilization of trusted BC-based unmanned aerial systems.

Original languageEnglish
Article numbere3706
JournalTransactions on Emerging Telecommunications Technologies
Volume33
Issue number8
DOIs
Publication statusPublished - Aug 2022

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure'. Together they form a unique fingerprint.

Cite this