Internet of Drones (IoD) plays a crucial role in the future Internet of Things due to its important features such as low cost, high flexibility, and mobility. The number of IoD applications is drastically increasing from military to civilian fields. Nevertheless, drones are resource-constrained and highly vulnerable to several security threats and attacks. The use of blockchain technology for securing IoD networks has gained growing attention. To this end, this paper presents a systematic literature review to analyze the current research area regarding the security of IoD environments using the emerging blockchain technology. Forty relevant studies were selected from 129 published articles to answer the identified research questions. The selected studies were classified into three main classes based on blockchain type. Furthermore, a comparison of the reviewed articles in terms of different factors is provided. The research findings show that the blockchain can guarantee fundamental security requirements such as authentication, privacy-preserving, confidentiality, integrity, and access control. Finally, open issues and challenges related to the combination of blockchain and IoD technologies are discussed.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628419PMC
http://dx.doi.org/10.1007/s13369-022-07380-6DOI Listing

Publication Analysis

Top Keywords

blockchain technology
12
systematic literature
8
literature review
8
internet drones
8
blockchain
6
iod
5
review blockchain
4
technology internet
4
security
4
drones security
4

Similar Publications

A digital twin is a virtual model of a real-world system that updates in real-time. In healthcare, digital twins are gaining popularity for monitoring activities like diet, physical activity, and sleep. However, their application in predicting serious conditions such as heart attacks, brain strokes and cancers remains under investigation, with current research showing limited accuracy in such predictions.

View Article and Find Full Text PDF

Interest in supporting Federated Learning (FL) using blockchains has grown significantly in recent years. However, restricting access to the trained models only to actively participating nodes remains a challenge even today. To address this concern, we propose a methodology that incentivizes model parameter sharing in an FL setup under Local Differential Privacy (LDP).

View Article and Find Full Text PDF

Secure IoT data dissemination with blockchain and transfer learning techniques.

Sci Rep

January 2025

Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.

Article Synopsis
  • Streaming IoT data is crucial for building trust in sustainable IoT solutions, but current systems often face issues with reliability, security, and transparency due to their centralized structures.
  • The research introduces TraVel, a framework that uses blockchain and transfer learning to improve the security of IoT data management, utilizing decentralized IPFS for data storage and a private Ethereum blockchain for enhanced data integrity.
  • TraVel implements self-executing smart contracts for access control and uses an adversarial domain adaptation model to filter out malicious data, ensuring only validated data is stored, with successful performance shown in simulations.
View Article and Find Full Text PDF

Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.

Sensors (Basel)

January 2025

Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.

This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.

View Article and Find Full Text PDF

With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!