scholarly journals Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem

2022 ◽  
Author(s):  
Maninderpal Singh ◽  
Gagangeet Singh Aujla ◽  
Rasmeet Singh Bali

AbstractInternet of Drones (IoD) facilitates the autonomous operations of drones into every application (warfare, surveillance, photography, etc) across the world. The transmission of data (to and fro) related to these applications occur between the drones and the other infrastructure over wireless channels that must abide to the stringent latency restrictions. However, relaying this data to the core cloud infrastructure may lead to a higher round trip delay. Thus, we utilize the cloud close to the ground, i.e., edge computing to realize an edge-envisioned IoD ecosystem. However, as this data is relayed over an open communication channel, it is often prone to different types of attacks due to it wider attack surface. Thus, we need to find a robust solution that can maintain the confidentiality, integrity, and authenticity of the data while providing desired services. Blockchain technology is capable to handle these challenges owing to the distributed ledger that store the data immutably. However, the conventional block architecture pose several challenges because of limited computational capabilities of drones. As the size of blockchain increases, the data flow also increases and so does the associated challenges. Hence, to overcome these challenges, in this work, we have proposed a derived blockchain architecture that decouples the data part (or block ledger) from the block header and shifts it to off-chain storage. In our approach, the registration of a new drone is performed to enable legitimate access control thus ensuring identity management and traceability. Further, the interactions happen in the form of transactions of the blockchain. We propose a lightweight consensus mechanism based on the stochastic selection followed by a transaction signing process to ensure that each drone is in control of its block. The proposed scheme also handles the expanding storage requirements with the help of data compression using a shrinking block mechanism. Lastly, the problem of additional delay anticipated due to drone mobility is handled using a multi-level caching mechanism. The proposed work has been validated in a simulated Gazebo environment and the results are promising in terms of different metrics. We have also provided numerical validations in context of complexity, communication overheads and computation costs.

2020 ◽  
Vol 24 (1) ◽  
pp. 175-188
Author(s):  
M. O. Tanygin

Purpose of research. Currently, various technologies and methods are used to control the integrity and authenticity of data transmitted through open communication channels. One of them is the technology for transmitting sequences of information packets connected to each other in chains using certain cryptographic algorithms. Similar approaches are used in the well-known blockchain technology and are focused on large volumes of transmitted and protected information and large sizes of additional service information fields. The purpose of this article is to study the characteristics of systems, transmission of small information packets in comparison with traditional size frames of TCP/IP stack, in which the broken packet sequence order is restored using the chain method, by analyzing hash sequences available in each of such packets.Methods. In this article, simulation modeling, system analysis method, method of systematization and ranking of the obtained results are used.Results. It is shown that increasing the size of the additional field with the hash of the previous message from 4 to 6 bits has a significant effect on reducing the probability of erroneous restore of the order of information packets. Further increasing the length of the hash field reduces the probability of error by only 2 to 5 % for each additional bit of the hash field for any length of the chain being restored. It is shown that the coefficient of the usage of the communication channel (the ratio of useful chain of packets to the volume of information transmitted through the communication channel) is maximum when the length of the hash field is 6 in the whole range of sizes of the field information part of the data packet.Conclusion. The paper shows that the chain method is applicable for restoring the original sequence of information packets transmitted from the source to the receiver in systems where the preservation of the sequence of packets is not guaranteed. The obtained values of the transmission system parameters allow us to ensure acceptable reliability of data transmission with a minimum amount of additional service information, and achieve information redundancy less than that in similar ones by 10-15.


Author(s):  
A. Shobanadevi ◽  
Sumegh Tharewal ◽  
Mukesh Soni ◽  
D. Dinesh Kumar ◽  
Ihtiram Raza Khan ◽  
...  

Author(s):  
Brian Tuan Khieu ◽  
Melody Moh

A cloud-based public key infrastructure (PKI) utilizing blockchain technology is proposed. Big data ecosystems have scalable and resilient needs that current PKI cannot satisfy. Enhancements include using blockchains to establish persistent access to certificate data and certificate revocation lists, decoupling of data from certificate authority, and hosting it on a cloud provider to tap into its traffic security measures. Instead of holding data within the transaction data fields, certificate data and status were embedded into smart contracts. The tests revealed a significant performance increase over that of both traditional and the version that stored data within blocks. The proposed method reduced the mining data size, and lowered the mining time to 6.6% of the time used for the block data storage method. Also, the mining gas cost per certificate was consequently cut by 87%. In summary, completely decoupling the certificate authority portion of a PKI and storing certificate data inside smart contracts yields a sizable performance boost while decreasing the attack surface.


JAMIA Open ◽  
2021 ◽  
Author(s):  
Anjum Khurshid ◽  
Cole Holan ◽  
Cody Cowley ◽  
Jeremiah Alexander ◽  
Daniel Toshio Harrell ◽  
...  

Abstract Objective Healthcare systems suffer from a lack of interoperability that creates “data silos,” causing patient linkage and data sharing problems. Blockchain technology’s unique architecture provides individuals greater control over their information and may help address some of the problems related to health data. A multidisciplinary team designed and tested a blockchain application, MediLinker, as a patient-centric identity management system. Methods The study used simulated data of “avatars” representing different types of patients. Thirty study participants were enrolled to visit simulated clinics, and perform various activities using MediLinker. Evaluation was based on Bouras’ criteria for patient-centric identity management and on the number of errors in entry and sharing of data by participants. Results Twenty-nine of the 30 participants completed all study activities. MediLinker fulfilled all of Bouras’ criteria except for one which was not testable. A majority of data errors were due to user error, such as wrong formatting and misspellings. Generally, the number of errors decreased with time. Due to COVID-19, sprint 2 was completed using “virtual” clinic visits. The number of user errors were less in virtual visits than in personal visits. Discussion The evaluation of MediLinker provides some evidence of the potential of a patient-centric identity management system using blockchain technology. The results showed a working system where patients have greater control over their information and can also easily provide consent for use of their data. Conclusion Blockchain applications for identity management hold great promise for use in healthcare but further research is needed before real-world adoption.


Sensors ◽  
2019 ◽  
Vol 19 (15) ◽  
pp. 3401 ◽  
Author(s):  
Toma ◽  
Alexandru ◽  
Popa ◽  
Zamfiroiu

Air pollution is a major factor in global heating and an increasing focus is centered on solving this problem. Urban communities take advantage of Information Technology (IT) and communications technologies in order to improve the control of environmental emissions and sound pollution. The aim is to mitigate health threatening risks and to raise awareness in relation to the effects of air pollution exposure. This paper investigates the key issues of a real-time pollution monitoring system, including the sensors, Internet of Things (IoT) communication protocols, and acquisition and transmission of data through communication channels, as well as data security and consistency. Security is a major focus in the proposed IoT solution. All other components of the system revolve around security. The bill of the materials and communications protocols necessary for the designing, development, and deployment of the IoT solution are part of this paper, as well as the security challenges. The paper’s proof of concept (PoC) addresses IoT security challenges within the communication channels between IoT gateways and the cloud infrastructure where data are transmitted to. The security implementations adhere to existing guidelines, best practices, and standards, ensuring a reliable and robust solution. In addition, the solution is able to interpret and analyze the collected data by using predictive analytics to create pollution maps. Those maps are used to implement real-time countermeasures, such as traffic diversion in a major city, to reduce concentrations of air pollutants by using existing data collected over a year. Once integrated with traffic management systems—cameras monitoring and traffic lights—this solution would reduce vehicle pollution by dynamically offering alternate routes or even enforcing re-routing when pollution thresholds are reached.


Author(s):  
Georgy Ishmaev

AbstractSelf-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also argued that while it might be appealing to operationalise the concept of ‘self-sovereignty’ in a narrow technical sense, depreciation of moral semantics obscures key challenges and long-term repercussions. Closer attention to the normative substance of the ‘sovereignty’ concept helps to highlight a range of ethical issues pertaining to the changing nature of human identity in the context of ubiquitous private data collection.


Sign in / Sign up

Export Citation Format

Share Document