2021
DOI: 10.1109/mnet.011.2000154
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Using Blockchain to Protect the Privacy of Drone Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 124 publications
(44 citation statements)
references
References 12 publications
0
44
0
Order By: Relevance
“…Lv et al [27] constructed the fuzzy mean clustering algorithm theory based on objective function by using K-means and fuzzy theory in big data analysis technology, which can significantly reduce the network data transmission performance delay, change the path, and effectively inhibit the spread of congestion. Subsequently, Lv et al [28] used blockchain technology to study the privacy and security of UAV big data. e performance evaluation results show that the proposed UAV big data privacy protection scheme based on blockchain technology has low computing cost in key generation, encryption, and decryption.…”
Section: Results Analysis and Discussionmentioning
confidence: 99%
“…Lv et al [27] constructed the fuzzy mean clustering algorithm theory based on objective function by using K-means and fuzzy theory in big data analysis technology, which can significantly reduce the network data transmission performance delay, change the path, and effectively inhibit the spread of congestion. Subsequently, Lv et al [28] used blockchain technology to study the privacy and security of UAV big data. e performance evaluation results show that the proposed UAV big data privacy protection scheme based on blockchain technology has low computing cost in key generation, encryption, and decryption.…”
Section: Results Analysis and Discussionmentioning
confidence: 99%
“…To calculate the PFI [30], after calculating the PFI of each parent [31], each node adds it to the value received from the parent and distributes it to all other nodes to determine the closed conduction index of each path. Node S then selects the path with the least possible value from the provided paths, and in this way, the malicious node G, which is a gray holes node that bypasses 50% of the packets, causing routing loss and loss.…”
Section: Proposed Security-aware Routing Methodsmentioning
confidence: 99%
“…Blockchain is a decentralized storage system that works without any central authority and stores data in the form of a list of blocks that are linked using the cryptographic hash of the previous block [ 19 ]. Data in the blockchain is stored in the form of blocks linked together to form an immutable chain.…”
Section: Research Methodology and Finding Appropriate Contentmentioning
confidence: 99%