{"title":"Privacy-Preserving Location Authentication for Low-altitude UAVs: A Blockchain-based Approach","authors":"Hengchang Pan, Yuanshuo Wang, Wei Wang, Ping Cao, Fangwei Ye, Qihui Wu","doi":"10.1051/sands/2024004","DOIUrl":null,"url":null,"abstract":"Efficient and trusted regulation of unmanned aerial vehicles (UAVs) is an essential but challenging issue in the future era of Internet of Low-altitude Intelligence, due to the difficulties in UAVs' identity recognition and location matching, potential for falsified information reporting, etc. To address this challenging issue, in this paper, we propose a blockchain-based UAV location authentication scheme, which employs a distance bounding protocol to establish a location proof, ensuring the authenticity of UAV positions. To preserve the privacy of UAVs, anonymous certificates and zero-knowledge proof are used. The security of the proposed scheme is analyzed. Experiments demonstrate the efficiency and feasibility of the proposed scheme.","PeriodicalId":513337,"journal":{"name":"Security and Safety","volume":"56 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Safety","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1051/sands/2024004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Efficient and trusted regulation of unmanned aerial vehicles (UAVs) is an essential but challenging issue in the future era of Internet of Low-altitude Intelligence, due to the difficulties in UAVs' identity recognition and location matching, potential for falsified information reporting, etc. To address this challenging issue, in this paper, we propose a blockchain-based UAV location authentication scheme, which employs a distance bounding protocol to establish a location proof, ensuring the authenticity of UAV positions. To preserve the privacy of UAVs, anonymous certificates and zero-knowledge proof are used. The security of the proposed scheme is analyzed. Experiments demonstrate the efficiency and feasibility of the proposed scheme.