Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach
- URL: http://arxiv.org/abs/2312.06928v1
- Date: Tue, 12 Dec 2023 01:55:04 GMT
- Title: Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach
- Authors: Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kaiqi Xiong, Abdellah Chehri, Nasir Ghani, Jan Bieniek,
- Abstract summary: Unmanned Aerial Vehicles (UAVs) have evolved into indispensable tools for effectively managing disasters and responding to emergencies.
It is substantial to identify and consider the different security challenges in the research and development associated with advanced UAV-based B5G/6G architectures.
- Score: 4.552065156611815
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have evolved into indispensable tools for effectively managing disasters and responding to emergencies. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAV-based B5G/6G architectures. Following this requirement, the present study thoroughly examines the security considerations about UAVs in relation to the architectural framework of the 5G/6G system, the technologies that facilitate its operation, and the concerns surrounding privacy. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAV-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAV-based systems, along with the open challenges and strategies for future research work.
Related papers
- Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways [21.263571241047178]
The vision for 6G aims to enhance network capabilities with faster data rates, near-zero latency, and higher capacity.
This advancement seeks to enable immersive mixed-reality experiences, holographic communications, and smart city infrastructures.
The expansion of 6G raises critical security and privacy concerns, such as unauthorized access and data breaches.
arXiv Detail & Related papers (2024-10-04T03:03:44Z) - Enhancing Physical Layer Communication Security through Generative AI with Mixture of Experts [80.0638227807621]
generative artificial intelligence (GAI) models have demonstrated superiority over conventional AI methods.
MoE, which uses multiple expert models for prediction through a gate mechanism, proposes possible solutions.
arXiv Detail & Related papers (2024-05-07T11:13:17Z) - Securing the Skies: An IRS-Assisted AoI-Aware Secure Multi-UAV System with Efficient Task Offloading [3.427366431933441]
Our framework incorporates exponential AoI metrics and emphasizes secrecy rate to tackle eavesdropping and jamming threats.
We introduce a transformer-enhanced Deep Reinforcement Learning (DRL) approach to optimize task offloading processes.
arXiv Detail & Related papers (2024-04-06T17:41:00Z) - Evidential Detection and Tracking Collaboration: New Problem, Benchmark
and Algorithm for Robust Anti-UAV System [56.51247807483176]
Unmanned Aerial Vehicles (UAVs) have been widely used in many areas, including transportation, surveillance, and military.
Previous works have simplified such an anti-UAV task as a tracking problem, where prior information of UAVs is always provided.
In this paper, we first formulate a new and practical anti-UAV problem featuring the UAVs perception in complex scenes without prior UAVs information.
arXiv Detail & Related papers (2023-06-27T19:30:23Z) - A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions [1.0923877073891446]
It is critical that security is ensured for UAVs and the networks that provide communication between UAVs.
This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and Flying Ad Hoc Networks (FANETs)
arXiv Detail & Related papers (2023-06-25T16:15:40Z) - Cooperative Multi-Agent Deep Reinforcement Learning for Reliable
Surveillance via Autonomous Multi-UAV Control [16.931263410773592]
CCTV-based surveillance using unmanned aerial vehicles (UAVs) is considered a key technology for security in smart city environments.
This paper creates a case where the UAVs with CCTV-cameras fly over the city area for flexible and reliable surveillance services.
Our proposed algorithm outperforms the state-of-the-art algorithms in terms of surveillance coverage, user support capability, and computational costs.
arXiv Detail & Related papers (2022-01-15T12:40:23Z) - A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From
Communications to Sensing and Intelligence [152.89360859658296]
5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC)
On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in 3D space.
On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference.
arXiv Detail & Related papers (2020-10-19T08:56:04Z) - Artificial Intelligence for UAV-enabled Wireless Networks: A Survey [72.10851256475742]
Unmanned aerial vehicles (UAVs) are considered as one of the promising technologies for the next-generation wireless communication networks.
Artificial intelligence (AI) is growing rapidly nowadays and has been very successful.
We provide a comprehensive overview of some potential applications of AI in UAV-based networks.
arXiv Detail & Related papers (2020-09-24T07:11:31Z) - Grand Challenges for Embedded Security Research in a Connected World [6.1916614285252]
The Computing Community Consortium (CCC) held a one-day visioning workshop to explore these issues.
Report synthesizes the results of that workshop and develops a list of strategic goals for research and education over the next 5-10 years.
arXiv Detail & Related papers (2020-05-13T21:01:57Z) - Artificial Intelligence Aided Next-Generation Networks Relying on UAVs [140.42435857856455]
Artificial intelligence (AI) assisted unmanned aerial vehicle (UAV) aided next-generation networking is proposed for dynamic environments.
In the AI-enabled UAV-aided wireless networks (UAWN), multiple UAVs are employed as aerial base stations, which are capable of rapidly adapting to the dynamic environment.
As a benefit of the AI framework, several challenges of conventional UAWN may be circumvented, leading to enhanced network performance, improved reliability and agile adaptivity.
arXiv Detail & Related papers (2020-01-28T15:10:22Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.