Enhancing Data Security in IOT-based UAV Networks through Blockchain Integration
Received: 12 December 2024 | Revised: 11 January 2025 and 19 January 2025 | Accepted: 24 January 2025 | Online: 26 March 2025
Corresponding author: Vinod Kumar
Abstract
There is great potential for utilizing Unmanned Aerial Vehicle (UAV) networks for commercial, military, and civil purposes. Therefore, as network volumes increase, communicating within UAV networks poses serious cybersecurity issues. Integrating Blockchain with UAV communication networks can offer a scalable and secure communication method. The proposed approach to a protected and accessible interaction method for peer-to-peer UAV networks integrates blockchain technology, allowing safe, decentralized, and cooperative communication between several entities. This study presents a new consensus-building technique to protect UAV network communications, integrating public key cryptography with blockchain Elliptic Curve Diffie-Hellman (ECDH) using the Secure Hash Algorithm (SHA) to preserve data integrity and secure key exchange to provide confidentiality.
Keywords:
Internet of Things (IoT), UAV, blockchain, blockchain-enabled UAVsDownloads
References
A. Islam and S. Y. Shin, "BHMUS: Blockchain Based Secure Outdoor Health Monitoring Scheme Using UAV in Smart City," in 2019 7th International Conference on Information and Communication Technology (ICoICT), Kuala Lumpur, Malaysia, Jul. 2019, pp. 1–6.
A. Kout, B. Bouaita, A. Beghriche, S. Labed, S. Chikhi, and E. B. Bourennane, "A Hybrid Optimization Solution for UAV Network Routing," Engineering, Technology & Applied Science Research, vol. 13, no. 2, pp. 10270–10278, Apr. 2023.
M. R. Manesh and N. Kaabouch, "Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions," Computers & Security, vol. 85, pp. 386–401, Aug. 2019.
M. R. Manesh and N. Kaabouch, "Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system," International Journal of Critical Infrastructure Protection, vol. 19, pp. 16–31, Dec. 2017.
V. Kumar, A. Asthana, and G. Tripathi, "A Systematic Literature Review of Blockchain-Assisted UAV Communication Systems," in 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON), New Delhi, India, Nov. 2024, pp. 1–9.
C. Rupa, G. Srivastava, T. Reddy Gadekallu, P. K. R. Maddikunta, and S. Bhattacharya, "Security and privacy of UAV data using blockchain technology," Journal of Information Security and Applications, vol. 55, Dec. 2020, Art. no. 102670.
A. Aljumah, T. A. Ahanger, and I. Ullah, "Heterogeneous Blockchain-Based Secure Framework for UAV Data," Mathematics, vol. 11, no. 6, Jan. 2023, Art. no. 1348.
M. A. Akhloufi, A. Couturier, and N. A. Castro, "Unmanned Aerial Vehicles for Wildland Fires: Sensing, Perception, Cooperation and Assistance," Drones, vol. 5, no. 1, Mar. 2021, Art. no. 15.
W. Lee, J. Y. Lee, H. Joo, and H. Kim, "An MPTCP-Based Transmission Scheme for Improving the Control Stability of Unmanned Aerial Vehicles," Sensors, vol. 21, no. 8, Jan. 2021, Art. no. 2791.
Q. Wu et al., "A Comprehensive Overview on 5G-and-Beyond Networks With UAVs: From Communications to Sensing and Intelligence," IEEE Journal on Selected Areas in Communications, vol. 39, no. 10, pp. 2912–2945, Jul. 2021.
B. Nassi, R. Bitton, R. Masuoka, A. Shabtai, and Y. Elovici, "SoK: Security and Privacy in the Age of Commercial Drones," in 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, May 2021, pp. 1434–1451.
H. R. Hasan and K. Salah, "Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts," IEEE Access, vol. 6, pp. 65439–65448, 2018.
N. Deepa et al., "A survey on blockchain for big data: Approaches, opportunities, and future directions," Future Generation Computer Systems, vol. 131, pp. 209–226, Jun. 2022.
A. A. Khan et al., "A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment," Computers and Electrical Engineering, vol. 102, Sep. 2022, Art. no. 108234.
A. Islam, A. Al Amin, and S. Y. Shin, "FBI: A Federated Learning-Based Blockchain-Embedded Data Accumulation Scheme Using Drones for Internet of Things," IEEE Wireless Communications Letters, vol. 11, no. 5, pp. 972–976, Feb. 2022.
B. Bera, S. Saha, A. K. Das, N. Kumar, P. Lorenz, and M. Alazab, "Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment," IEEE Transactions on Vehicular Technology, vol. 69, no. 8, pp. 9097–9111, Dec. 2020.
C. Feng et al., "Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach," IEEE Network, vol. 35, no. 1, pp. 130–137, Jan. 2021.
M. Gupta and S. Varma, "Optimal placement of UAVs of an aerial mesh network in an emergency situation," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 343–358, Jan. 2021.
A. M. Benaya, M. H. Ismail, A. S. Ibrahim, and A. A. Salem, "Physical Layer Security Enhancement via Intelligent Omni-Surfaces and UAV-Friendly Jamming," IEEE Access, vol. 11, pp. 2531–2544, 2023.
N. Choi and H. Kim, "A Blockchain-based User Authentication Model Using MetaMask," Journal of Internet Computing and Services, vol. 20, no. 6, pp. 119–127, 2019.
Downloads
How to Cite
License
Copyright (c) 2025 Vinod Kumar, Amit Asthana, Gaurav Tripathi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.