SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Blockchain Technology
Application in UAVs and
Cybersecurity Solutions
1
AHMED S. ELGAZZAR
ITIL@, CWA,MBA, MOT PH.D. RESEARCHER
Dec 2020
ahmed.elgazzar@mail.com
Agenda
 Introduction
 Blockchain structure
 Blockchain advantages
 UAVs main characteristics
 Blockchain and UAVs technology merge
 References
2
Introduction
• Due to advancement in Unmanned Aerial Vehicles (UAVs) in terms of manufacturing processes,
and communication and networking technology has led to a rise in their usage in civilian and
commercial applications.
• Due to being deployed in open atmosphere, UAVs are vulnerable to being lost, destroyed or
physically hijacked.
• With the UAV technology becoming essential, various issues in UAV networks such as intraUAV
communication, UAV security, air data security, data storage and management need to be
addressed.
• Blockchain being a distributed ledger protects the shared data using cryptography techniques such
as hash functions and public key encryption.
• Blockchain used for assuring the truthfulness of the information stored and for improving the
security and transparency of the UAVs.
• challenges to be addressed in the integration of Blockchain and UAVs and suggest some future
research directions.
3
Blockchain Advantages
• Data Driven technique.
• Decentralized based.
• Guarantees high security using cryptography as a security mechanism .
• Depends on the micro-transactions existing between the digital devices.
• Peer 2 Peer (Machine to Machine) network .
• Chain of Blocks connect through Hash Value.
4
Blockchain Architecture 5
Blockchain Architecture
The bottom-most layer in the
Blockchain architecture which
contains the timestamped
blocks of data.
Each data block consists of
the block body and the block
header.
Cryptography Mechanism
6
Blockchain Architecture
Network Layer is to distribute,
forward and authenticate the
Blockchain transactions.
Peer-to-Peer (P2P) networks.
Once a transaction is created, it
broadcasts to the neighboring
nodes for verication based on
pre-dened specications.
Once transaction is validated, it
is sent to the other nodes
and in case of rejection, it is
discarded.
Only valid transactions are
allowed to be recorded at each
node
7
Blockchain Architecture
•Consensus mechanism is very
important layer.
•This layer has different
consensus algorithms.
•Required to reach a consensus
among the untrusted parties
participating in the Blockchain
network.
•Consensus performance among
the participants is the key for
avoiding the need for a
centralized entity.
•Protocols used to ensure
consensus among the
participants
8
Blockchain Architecture
•One of the foundation pillars of
Blockchain architecture
•The miners (Machines , Peers,
Devises ) consume a lot of
processing power to mine the
blocks and
•in return get reward points in the
form of incentives such as digital
currency corresponding to the
magnitude of their work.
9
Blockchain Architecture
•The contract layer makes the
Blockchain programmable and
enables the inclusion of different
scripts, smart contracts, and
algorithms with the help of
which complex transactions
can be carried out on the
Blockchain.
•A smart contract is a set of rules
which when met triggers a
transaction between the two
parties involved in the contract.
When these parties agree with
the terms specied within the
contract, it is cryptographically
signed and is broadcast to all
other nodes participating in the
Blockchain for verication
10
Blockchain Architecture
•Application is highest layer of
the Blockchain which comprises
of its applications in various
practical elds such as IoT,
nance, UAVs, or IoD,..
11
Block Structure
Hashes & Transactions
Block Body
Block Header
Merkle
Root
NONCE
Previous Block Hash
Timestamp
Current Block Hash
Data Structure tree for
all the hashes of all the
transactions that are
part of a block in
a Blockchain network
.
[Number Only Used Once]
Unique & number
random number added
to the block by the
miners to get the
desired pattern in the
block-hash
Marking the time at
which the
corresponding block
was created
12
Block Structure
Hashes & Transactions
Block Body
Block Header
Merkle
Root
Nonce
Previous Block Hash
Timestamp
Current Block Hash
13
Blockchain Types 14
UAVs main characteristics 15
Data Driven
UAVs Swarm
or Fleet
Identification Cybersecurity
Military
IoT
Rescue
Sensoring
Industry 4
Agriculture
UAV-Blockchain Application 16
Supply
Chain
Management
UAV-Blockchain Tech. Merge 17
• BC provides reliable P2P
communication to UAV
network [UAVNETs] to
overcome possible threat
and attacks.
Collision free movement of UAVs
• One of the most important
requirements in UAV networks is that
the UAVs do not physically crash into
each other and also that they do not
interfere with each other’s signal.
• Blockchain can help achieve this
feature by storing the coordinates of all
the UAVs in its database using
algorithms and referring to these stored
coordinates.
• UAVs can decide their optimal route to
move to a destination without any
collision and with minimum
interference.
18
Data and entity authentication
• Because of the facility of the public and
private key, UAVs can communicate
with each other through a common
channel and avoid hacking of data by
third parties who can get access to the
channel.
• UAVs can also uniquely sign the data
collected using their private key and
can broadcast it to the whole network.
• Also using Digital Signature.
• This provides data source and entity
authentication between the UAVs and
third party agents as the origin of the
data can be traced using this feature.
19
Cooperation and fast synchronization
• Due to common communication channel in the form of
a Blockchain, UAVs can make requests for assistance
from other UAVs or other robots in the swarm in
emergency cases.
• Using distributed decision making, they can get the
opinion of other UAVs and decide the case of confusion
and such decisions can be stored in the Blockchain for
the new members who join the swarm.
• Can directly download the ledger containing previous
decision histories and synchronize with the swarm what
saves a lot of time and processing power
• environment
20
Spoofing
Tampering
Information disclosure
Denial of service
Elevation of privilege
Repudiation
The STRIDE Threat Taxonomy
Distributed decision making mechanism
• When UAV faces a confusion between some
choices it creates new addresses in the
Blockchain network.
• Each address represents one of the options for
the decision.
• other UAVs in the network make a transaction
of amount 1 or 0 for these newly created
addresses depending on the option they
choose based on their discretion.
• In the end, the address which has the
maximum balance in its wallet is chosen.
21
Secure communication channel for swarms
• Blockchain can provide reliable peer-to-peer
communication channels to swarm agents
• Blockchain encryption scheme, public-key
cryptography and digital signature schemes are
used
• public and private keys are created for each agent
to provide the required capabilities
• Public keys = account numbers which are publicly
accessible information
• private keys = passwords used to authenticate an
agent’s identity and the functions that it executes
22
Any UAV can send data to any other UAV in the system since the public keys of all the
UAVs are known while private keys are private to the individual UAVs.
Reference
 “Applications of blockchain in unmanned aerial vehicles: A review”
Author: Tejasvi Alladi,Vinay Chamola,Nishad Sahu,Mohsen Guizani
Publication: Vehicular Communications
Publisher: Elsevier
Date: June 2020
 https://securityintelligence.com/using-blockchain-to-address-drone-cybersecurity/
23
24

Weitere ähnliche Inhalte

Was ist angesagt?

V2X Communications: Getting our Cars Talking
V2X Communications: Getting our Cars TalkingV2X Communications: Getting our Cars Talking
V2X Communications: Getting our Cars TalkingAlison Chaiken
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain pptWajihawaseem
 
Rain technology ppt
Rain technology pptRain technology ppt
Rain technology pptDC Graphics
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
Intermediate: Vehicle to Everything (V2X) Introduction
Intermediate: Vehicle to Everything (V2X) IntroductionIntermediate: Vehicle to Everything (V2X) Introduction
Intermediate: Vehicle to Everything (V2X) Introduction3G4G
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
Smart contracts using web3.js
Smart contracts using web3.jsSmart contracts using web3.js
Smart contracts using web3.jsFelix Crisan
 
Hyperledger
HyperledgerHyperledger
HyperledgerVinay Aitha
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Merlec Mpyana
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network VirtualizationKingston Smiler
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsTechracers
 
Blockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesBlockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesNabi Hasan
 

Was ist angesagt? (20)

V2X Communications: Getting our Cars Talking
V2X Communications: Getting our Cars TalkingV2X Communications: Getting our Cars Talking
V2X Communications: Getting our Cars Talking
 
11. Future of Drones
11. Future of Drones11. Future of Drones
11. Future of Drones
 
BLOCK CHAIN
BLOCK CHAINBLOCK CHAIN
BLOCK CHAIN
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
 
IoT security
IoT securityIoT security
IoT security
 
Rain technology ppt
Rain technology pptRain technology ppt
Rain technology ppt
 
Blockchain 2.0
Blockchain 2.0Blockchain 2.0
Blockchain 2.0
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
Intermediate: Vehicle to Everything (V2X) Introduction
Intermediate: Vehicle to Everything (V2X) IntroductionIntermediate: Vehicle to Everything (V2X) Introduction
Intermediate: Vehicle to Everything (V2X) Introduction
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Smart contracts using web3.js
Smart contracts using web3.jsSmart contracts using web3.js
Smart contracts using web3.js
 
Hyperledger
HyperledgerHyperledger
Hyperledger
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Cellular V2X
Cellular V2XCellular V2X
Cellular V2X
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Blockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesBlockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in Libraries
 
Drones (UAV)
Drones (UAV)Drones (UAV)
Drones (UAV)
 
Drones
DronesDrones
Drones
 

Ähnlich wie Blockchain technology application in drones and cybersecurity

InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
 
Wwc developing hyperledger applications v4
Wwc  developing hyperledger applications v4Wwc  developing hyperledger applications v4
Wwc developing hyperledger applications v4LennartF
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
 
Blockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfBlockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfssusera441c2
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruLennartF
 
InitVerse Blockchain - Blockchain web3.0 technology application.pdf
InitVerse Blockchain - Blockchain web3.0 technology application.pdfInitVerse Blockchain - Blockchain web3.0 technology application.pdf
InitVerse Blockchain - Blockchain web3.0 technology application.pdfInitVerse Blockchain
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptxJackTheMan1
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
Digital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumDigital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumnurhaniffah1
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on AzureNuri Cankaya
 
hyperledger-chaincode & hyperl fabric.pptx
hyperledger-chaincode & hyperl fabric.pptxhyperledger-chaincode & hyperl fabric.pptx
hyperledger-chaincode & hyperl fabric.pptxdeepaksingh160910
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinM Shamim Iqbal
 
InitVerse Blockchain - Application of blockchain in financial field.pdf
InitVerse Blockchain - Application of blockchain in financial field.pdfInitVerse Blockchain - Application of blockchain in financial field.pdf
InitVerse Blockchain - Application of blockchain in financial field.pdfInitVerse Blockchain
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET Journal
 

Ähnlich wie Blockchain technology application in drones and cybersecurity (20)

InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
Wwc developing hyperledger applications v4
Wwc  developing hyperledger applications v4Wwc  developing hyperledger applications v4
Wwc developing hyperledger applications v4
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...
 
Blockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfBlockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdf
 
Blockchain
BlockchainBlockchain
Blockchain
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ru
 
InitVerse Blockchain - Blockchain web3.0 technology application.pdf
InitVerse Blockchain - Blockchain web3.0 technology application.pdfInitVerse Blockchain - Blockchain web3.0 technology application.pdf
InitVerse Blockchain - Blockchain web3.0 technology application.pdf
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
Block chain technology
Block chain technology Block chain technology
Block chain technology
 
Digital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumDigital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereum
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
hyperledger-chaincode & hyperl fabric.pptx
hyperledger-chaincode & hyperl fabric.pptxhyperledger-chaincode & hyperl fabric.pptx
hyperledger-chaincode & hyperl fabric.pptx
 
Chapter 3.pptx
Chapter 3.pptxChapter 3.pptx
Chapter 3.pptx
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
InitVerse Blockchain - Application of blockchain in financial field.pdf
InitVerse Blockchain - Application of blockchain in financial field.pdfInitVerse Blockchain - Application of blockchain in financial field.pdf
InitVerse Blockchain - Application of blockchain in financial field.pdf
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
 

KĂźrzlich hochgeladen

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

KĂźrzlich hochgeladen (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Blockchain technology application in drones and cybersecurity

  • 1. Blockchain Technology Application in UAVs and Cybersecurity Solutions 1 AHMED S. ELGAZZAR ITIL@, CWA,MBA, MOT PH.D. RESEARCHER Dec 2020 ahmed.elgazzar@mail.com
  • 2. Agenda  Introduction  Blockchain structure  Blockchain advantages  UAVs main characteristics  Blockchain and UAVs technology merge  References 2
  • 3. Introduction • Due to advancement in Unmanned Aerial Vehicles (UAVs) in terms of manufacturing processes, and communication and networking technology has led to a rise in their usage in civilian and commercial applications. • Due to being deployed in open atmosphere, UAVs are vulnerable to being lost, destroyed or physically hijacked. • With the UAV technology becoming essential, various issues in UAV networks such as intraUAV communication, UAV security, air data security, data storage and management need to be addressed. • Blockchain being a distributed ledger protects the shared data using cryptography techniques such as hash functions and public key encryption. • Blockchain used for assuring the truthfulness of the information stored and for improving the security and transparency of the UAVs. • challenges to be addressed in the integration of Blockchain and UAVs and suggest some future research directions. 3
  • 4. Blockchain Advantages • Data Driven technique. • Decentralized based. • Guarantees high security using cryptography as a security mechanism . • Depends on the micro-transactions existing between the digital devices. • Peer 2 Peer (Machine to Machine) network . • Chain of Blocks connect through Hash Value. 4
  • 6. Blockchain Architecture The bottom-most layer in the Blockchain architecture which contains the timestamped blocks of data. Each data block consists of the block body and the block header. Cryptography Mechanism 6
  • 7. Blockchain Architecture Network Layer is to distribute, forward and authenticate the Blockchain transactions. Peer-to-Peer (P2P) networks. Once a transaction is created, it broadcasts to the neighboring nodes for verication based on pre-dened specications. Once transaction is validated, it is sent to the other nodes and in case of rejection, it is discarded. Only valid transactions are allowed to be recorded at each node 7
  • 8. Blockchain Architecture •Consensus mechanism is very important layer. •This layer has different consensus algorithms. •Required to reach a consensus among the untrusted parties participating in the Blockchain network. •Consensus performance among the participants is the key for avoiding the need for a centralized entity. •Protocols used to ensure consensus among the participants 8
  • 9. Blockchain Architecture •One of the foundation pillars of Blockchain architecture •The miners (Machines , Peers, Devises ) consume a lot of processing power to mine the blocks and •in return get reward points in the form of incentives such as digital currency corresponding to the magnitude of their work. 9
  • 10. Blockchain Architecture •The contract layer makes the Blockchain programmable and enables the inclusion of different scripts, smart contracts, and algorithms with the help of which complex transactions can be carried out on the Blockchain. •A smart contract is a set of rules which when met triggers a transaction between the two parties involved in the contract. When these parties agree with the terms specied within the contract, it is cryptographically signed and is broadcast to all other nodes participating in the Blockchain for verication 10
  • 11. Blockchain Architecture •Application is highest layer of the Blockchain which comprises of its applications in various practical elds such as IoT, nance, UAVs, or IoD,.. 11
  • 12. Block Structure Hashes & Transactions Block Body Block Header Merkle Root NONCE Previous Block Hash Timestamp Current Block Hash Data Structure tree for all the hashes of all the transactions that are part of a block in a Blockchain network . [Number Only Used Once] Unique & number random number added to the block by the miners to get the desired pattern in the block-hash Marking the time at which the corresponding block was created 12
  • 13. Block Structure Hashes & Transactions Block Body Block Header Merkle Root Nonce Previous Block Hash Timestamp Current Block Hash 13
  • 15. UAVs main characteristics 15 Data Driven UAVs Swarm or Fleet Identification Cybersecurity Military IoT Rescue Sensoring Industry 4 Agriculture
  • 17. UAV-Blockchain Tech. Merge 17 • BC provides reliable P2P communication to UAV network [UAVNETs] to overcome possible threat and attacks.
  • 18. Collision free movement of UAVs • One of the most important requirements in UAV networks is that the UAVs do not physically crash into each other and also that they do not interfere with each other’s signal. • Blockchain can help achieve this feature by storing the coordinates of all the UAVs in its database using algorithms and referring to these stored coordinates. • UAVs can decide their optimal route to move to a destination without any collision and with minimum interference. 18
  • 19. Data and entity authentication • Because of the facility of the public and private key, UAVs can communicate with each other through a common channel and avoid hacking of data by third parties who can get access to the channel. • UAVs can also uniquely sign the data collected using their private key and can broadcast it to the whole network. • Also using Digital Signature. • This provides data source and entity authentication between the UAVs and third party agents as the origin of the data can be traced using this feature. 19
  • 20. Cooperation and fast synchronization • Due to common communication channel in the form of a Blockchain, UAVs can make requests for assistance from other UAVs or other robots in the swarm in emergency cases. • Using distributed decision making, they can get the opinion of other UAVs and decide the case of confusion and such decisions can be stored in the Blockchain for the new members who join the swarm. • Can directly download the ledger containing previous decision histories and synchronize with the swarm what saves a lot of time and processing power • environment 20 Spoofing Tampering Information disclosure Denial of service Elevation of privilege Repudiation The STRIDE Threat Taxonomy
  • 21. Distributed decision making mechanism • When UAV faces a confusion between some choices it creates new addresses in the Blockchain network. • Each address represents one of the options for the decision. • other UAVs in the network make a transaction of amount 1 or 0 for these newly created addresses depending on the option they choose based on their discretion. • In the end, the address which has the maximum balance in its wallet is chosen. 21
  • 22. Secure communication channel for swarms • Blockchain can provide reliable peer-to-peer communication channels to swarm agents • Blockchain encryption scheme, public-key cryptography and digital signature schemes are used • public and private keys are created for each agent to provide the required capabilities • Public keys = account numbers which are publicly accessible information • private keys = passwords used to authenticate an agent’s identity and the functions that it executes 22 Any UAV can send data to any other UAV in the system since the public keys of all the UAVs are known while private keys are private to the individual UAVs.
  • 23. Reference  “Applications of blockchain in unmanned aerial vehicles: A review” Author: Tejasvi Alladi,Vinay Chamola,Nishad Sahu,Mohsen Guizani Publication: Vehicular Communications Publisher: Elsevier Date: June 2020  https://securityintelligence.com/using-blockchain-to-address-drone-cybersecurity/ 23
  • 24. 24