A Study on Secured Unmanned Aerial Vehicle-Based Fog Computing Networks

Features
Authors Abstract
Content
With the recent advancement in technologies, researchers worldwide have a growing interest in unmanned aerial vehicles (UAVs). The last few years have been significant in terms of its global awareness, adoption, and applications across industries. In UAV-aided wireless networks, there are some limitations in terms of power consumption, data computation, data processing, endurance, and security. So, the idea of UAVs and Edge or Fog computing together deals with the limitations and provides intelligence at the network’s edge, which makes it more valuable to use in emergency applications. Fog computing distributes data in a decentralized way and blockchain also works on the principle of decentralization. Blockchain, as a decentralized database, uses cryptographic methods including hash functions and public key encryption to secure the user information. It is a prominent solution to secure the user’s information in blocks and maintain privacy. The ongoing development in collaborative UAVs and fog computing networks had put further a major challenge of security that need to be investigated. This article presents a study on security attacks and requirements needed to ensure security in UAV-based fog networks. We provide blockchain security in UAV-based fog computing to secure a large volume of data. The communicated data is stored in the form of blocks with hash functions, which guarantee security in the network. Thus, the aim of blockchain security is to guarantee that any hostile third party cannot corrupt or change the live missions or tasks allocated to actual UAV–Fog nodes.
Meta TagsDetails
DOI
https://doi.org/10.4271/12-07-02-0011
Pages
11
Citation
Gupta, A., and Gupta, S., "A Study on Secured Unmanned Aerial Vehicle-Based Fog Computing Networks,"https://doi.org/10.4271/12-07-02-0011.
Additional Details
Publisher
Published
Nov 3, 2023
Product Code
12-07-02-0011
Content Type
Journal Article
Language
English