生物识别和智能合约使无人机辅助战场系统的安全数据共享成为可能

IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Neeraj Kumar, Rifaqat Ali
{"title":"生物识别和智能合约使无人机辅助战场系统的安全数据共享成为可能","authors":"Neeraj Kumar,&nbsp;Rifaqat Ali","doi":"10.1016/j.compeleceng.2025.110407","DOIUrl":null,"url":null,"abstract":"<div><div>Surveillance drones in intelligent battlefield systems capture sensitive data but face severe security threats, including eavesdropping, tampering, Global Positioning System (GPS) spoofing, and drone hijacking. To counter these, we propose a secure data-sharing protocol integrating smart contracts and biometric-based multi-factor authentication within a drone-assisted Internet of Things (IoT) environment. The protocol leverages decentralized fog servers for real-time, low-latency communication while ensuring robust defense against attacks like impersonation and replay. It supports dynamic drone integration and secure credential updates, addressing key limitations in existing schemes. Security is rigorously validated via the Real-or-Random (RoR) model, Scyther tool, and informal analysis. Comparative results confirm that our protocol outperforms prior solutions in terms of security, scalability, energy efficiency, and computational overhead.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110407"},"PeriodicalIF":4.0000,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Biometric and smart contract enabled secure data sharing in drone-assisted battlefield systems\",\"authors\":\"Neeraj Kumar,&nbsp;Rifaqat Ali\",\"doi\":\"10.1016/j.compeleceng.2025.110407\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Surveillance drones in intelligent battlefield systems capture sensitive data but face severe security threats, including eavesdropping, tampering, Global Positioning System (GPS) spoofing, and drone hijacking. To counter these, we propose a secure data-sharing protocol integrating smart contracts and biometric-based multi-factor authentication within a drone-assisted Internet of Things (IoT) environment. The protocol leverages decentralized fog servers for real-time, low-latency communication while ensuring robust defense against attacks like impersonation and replay. It supports dynamic drone integration and secure credential updates, addressing key limitations in existing schemes. Security is rigorously validated via the Real-or-Random (RoR) model, Scyther tool, and informal analysis. Comparative results confirm that our protocol outperforms prior solutions in terms of security, scalability, energy efficiency, and computational overhead.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"124 \",\"pages\":\"Article 110407\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2025-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790625003507\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625003507","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

智能战场系统中的监视无人机捕获敏感数据,但面临严重的安全威胁,包括窃听、篡改、全球定位系统(GPS)欺骗和无人机劫持。为了解决这些问题,我们提出了一种安全的数据共享协议,该协议在无人机辅助的物联网(IoT)环境中集成了智能合约和基于生物识别的多因素认证。该协议利用分散的雾服务器进行实时、低延迟的通信,同时确保对模拟和重放等攻击的强大防御。它支持动态无人机集成和安全凭证更新,解决了现有方案中的关键限制。安全性通过Real-or-Random (RoR)模型、Scyther工具和非正式分析得到严格验证。对比结果证实,我们的协议在安全性、可扩展性、能源效率和计算开销方面优于先前的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Biometric and smart contract enabled secure data sharing in drone-assisted battlefield systems
Surveillance drones in intelligent battlefield systems capture sensitive data but face severe security threats, including eavesdropping, tampering, Global Positioning System (GPS) spoofing, and drone hijacking. To counter these, we propose a secure data-sharing protocol integrating smart contracts and biometric-based multi-factor authentication within a drone-assisted Internet of Things (IoT) environment. The protocol leverages decentralized fog servers for real-time, low-latency communication while ensuring robust defense against attacks like impersonation and replay. It supports dynamic drone integration and secure credential updates, addressing key limitations in existing schemes. Security is rigorously validated via the Real-or-Random (RoR) model, Scyther tool, and informal analysis. Comparative results confirm that our protocol outperforms prior solutions in terms of security, scalability, energy efficiency, and computational overhead.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computers & Electrical Engineering
Computers & Electrical Engineering 工程技术-工程:电子与电气
CiteScore
9.20
自引率
7.00%
发文量
661
审稿时长
47 days
期刊介绍: The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency. Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信