2020 IEEE International Conference on Electro Information Technology (EIT) 2020
DOI: 10.1109/eit48999.2020.9208314
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Blockchain-based Communication Approach for UAV Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…As the network grows larger, the use of blockchain technology could assist in guaranteeing its security and transparency. In order to ensure the safety of communications in a UAV network, the authors of the study ( Ghribi et al, 2020 ) suggest a new consensus-building methodology that combines blockchain technology, the Elliptic Curve Diffie-Hellman public key cryptography technique, and the one-time pad encryption technique.…”
Section: What Are the Solutions To Key Challenges With The Integratio...mentioning
confidence: 99%
“…As the network grows larger, the use of blockchain technology could assist in guaranteeing its security and transparency. In order to ensure the safety of communications in a UAV network, the authors of the study ( Ghribi et al, 2020 ) suggest a new consensus-building methodology that combines blockchain technology, the Elliptic Curve Diffie-Hellman public key cryptography technique, and the one-time pad encryption technique.…”
Section: What Are the Solutions To Key Challenges With The Integratio...mentioning
confidence: 99%
“…In the same context, Ghribi et al [48] targeted the confidentiality aspect of UAV networks by implementing a private blockchain with encrypted transactions. The popular public key cryptography with the Elliptic Curve Diffie-Hellman (ECDH) model was used along with a one-time password (OTP).…”
Section: B Cybersecuritymentioning
confidence: 99%
“…This study in [32] offered a novel approach for safeguarding communications between unmanned aerial vehicles (UAVs) engaged in various tasks. A one-of-a-kind method for UAVs to enable network transactions without delivering encrypted communications is included in the proposed technique.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%