Efficient and trusted regulation of unmanned aerial vehicles(UAVs)is an essential but challenging issue in the future era of the Internet of Low-altitude Intelligence,due to the difficulties in UAVs'identity recog...Efficient and trusted regulation of unmanned aerial vehicles(UAVs)is an essential but challenging issue in the future era of the Internet of Low-altitude Intelligence,due to the difficulties in UAVs'identity recognition and location matching,potential for falsified information reporting,etc.To address this challenging issue,in this paper,we propose a blockchain-based UAV location authentication scheme,which employs a distance bounding protocol to establish a location proof,ensuring the authenticity of UAV positions.To preserve the privacy of UAVs,anonymous certificates and zero-knowledge proof are used.The security of the proposed scheme is analyzed.Experiments demonstrate the efficiency and feasibility of the proposed scheme.展开更多
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr...The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results.展开更多
基金supported in part by the Jiangsu Provincial Key Research and Development Program under Grants BE2022068the National Natural Science Foundation of China under Grant 62371231,62001220+2 种基金the Young Elite Scientist Sponsorship ProgramChina Association for Science and TechnologyYESS20200207
文摘Efficient and trusted regulation of unmanned aerial vehicles(UAVs)is an essential but challenging issue in the future era of the Internet of Low-altitude Intelligence,due to the difficulties in UAVs'identity recognition and location matching,potential for falsified information reporting,etc.To address this challenging issue,in this paper,we propose a blockchain-based UAV location authentication scheme,which employs a distance bounding protocol to establish a location proof,ensuring the authenticity of UAV positions.To preserve the privacy of UAVs,anonymous certificates and zero-knowledge proof are used.The security of the proposed scheme is analyzed.Experiments demonstrate the efficiency and feasibility of the proposed scheme.
基金supported by the National Natural Science Foundation of China(Grant No.41371402)the National Basic Research Program of China("973"Program)(Grant No.2011CB302306)the Fundamental Research Funds for the Central University(Grant No.2015211020201 and No.211274230)
文摘The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results.