skip to main content
10.1145/3139923.3139932acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain

Published:30 October 2017Publication History

ABSTRACT

Ultra-dense wireless networks require on-demand nodes which can trust each other and relay information despite the difference in their service providers. This paper presents the secure utilization of drones as on-demand nodes for inter-service operability between multiple vendors by exploiting the features of the blockchain. Various components and strategies for driving blockchain-based drones are also presented. Further, this paper features the threat implications of the blockchain-based drones and compares the deployment issues with the centralized and traditional drone-assisted wireless networks.

References

  1. X. Ge, S. Tu, G. Mao, C.-X. Wang, and T. Han, "5g ultra-dense cellular networks," IEEE Wireless Communications, vol. 23, no. 1, pp. 72--79, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  2. V. Sharma, R. Sabatini, and S. Ramasamy, "Uavs assisted delay optimization in heterogeneous wireless networks," IEEE Communications Letters, vol. 20, no. 12, pp. 2526--2529, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  3. I. Bor-Yaliniz and H. Yanikomeroglu, "The new frontier in ran heterogeneity: Multi-tier drone-cells," IEEE Communications Magazine, vol. 54, no. 11, pp. 48--55, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Tschorsch and B. Scheuermann, "Bitcoin and beyond: A technical survey on decentralized digital currencies," IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084--2123, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Kraft, "Difficulty control for blockchain-based consensus systems," Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397--413, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  6. K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things," IEEE Access, vol. 4, pp. 2292--2303, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  7. E. C. Ferrer, "The blockchain: a new framework for robotic swarm systems," arXiv preprint arXiv:1608.00695, 2016.Google ScholarGoogle Scholar
  8. V. Sharma, M. Bennis, and R. Kumar, "Uav-assisted heterogeneous networks for capacity enhancement," IEEE Communications Letters, vol. 20, no. 6, pp. 1207--1210, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  9. C. Natarajan, D. R. High, and J. V. John, "Unmanned aerial delivery to secure location," Nov. 23 2016. US Patent App. 15/360,091.Google ScholarGoogle Scholar
  10. V. W. Lee, C. Kim, J. Chhugani, M. Deisher, D. Kim, A. D. Nguyen, N. Satish, M. Smelyanskiy, S. Chennupaty, P. Hammarlund, R. Singhal, and P. Dubey, "Debunking the 100x gpu vs. cpu myth: An evaluation of throughput computing on cpu and gpu," in ISCA '10, pp. 451--460, ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  MIST '17: Proceedings of the 2017 International Workshop on Managing Insider Security Threats
                  October 2017
                  108 pages
                  ISBN:9781450351775
                  DOI:10.1145/3139923

                  Copyright © 2017 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 30 October 2017

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • short-paper

                  Acceptance Rates

                  MIST '17 Paper Acceptance Rate7of18submissions,39%Overall Acceptance Rate21of54submissions,39%

                  Upcoming Conference

                  CCS '24
                  ACM SIGSAC Conference on Computer and Communications Security
                  October 14 - 18, 2024
                  Salt Lake City , UT , USA

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader