Loading…

Blockchain-based secure delivery of medical supplies using drones

The advantages provided by the drones with regards to three dimensional mobility and ease of deployment makes them a viable candidate for 5G and beyond (B5G) networks. Significant amount of research has been conducted on the aspect of networking for using drones as base stations to provide different...

Full description

Saved in:
Bibliographic Details
Published in:Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2022-02, Vol.204, p.108706, Article 108706
Main Authors: Cheema, Muhammad Asaad, Ansari, Rafay Iqbal, Ashraf, Nouman, Hassan, Syed Ali, Qureshi, Hassaan Khaliq, Bashir, Ali Kashif, Politis, Christos
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The advantages provided by the drones with regards to three dimensional mobility and ease of deployment makes them a viable candidate for 5G and beyond (B5G) networks. Significant amount of research has been conducted on the aspect of networking for using drones as base stations to provide different services. In this work, we deviate from the traditional use of drones to provide connectivity and explore the delivery of products through drones in the context of maintaining social distancing. However, drone delivery process for critical applications such as delivering medical supplies is vulnerable to attacks such as impersonation attacks. The security of drone operation is important to save the users from any breaches that can lead to financial and physical losses. To cope with these security issues and to make the delivery process transparent, we propose a blockchain-based drone delivery system that registers and authenticates the participating entities including products (medical supplies), warehouse (medical centers) and drones. To this end, we utilize Ethereum platform for implementation of blockchain and smart contract and we present an analysis of different factors that influence the authentication process in terms of time and the number of transactions. Furthermore, to make the communication of a drone with command and control center more secure and robust, we use machine learning (ML)-based intrusion detection system.
ISSN:1389-1286
1872-7069
DOI:10.1016/j.comnet.2021.108706