Browse Publications Technical Papers 12-07-02-0011

A Study on Secured Unmanned Aerial Vehicle-Based Fog Computing Networks 12-07-02-0011

This also appears in SAE International Journal of Connected and Automated Vehicles-V133-12EJ

With the recent advancement in technologies, researchers worldwide have a growing interest in unmanned aerial vehicles (UAVs). The last few years have been significant in terms of its global awareness, adoption, and applications across industries. In UAV-aided wireless networks, there are some limitations in terms of power consumption, data computation, data processing, endurance, and security. So, the idea of UAVs and Edge or Fog computing together deals with the limitations and provides intelligence at the network’s edge, which makes it more valuable to use in emergency applications. Fog computing distributes data in a decentralized way and blockchain also works on the principle of decentralization. Blockchain, as a decentralized database, uses cryptographic methods including hash functions and public key encryption to secure the user information. It is a prominent solution to secure the user’s information in blocks and maintain privacy. The ongoing development in collaborative UAVs and fog computing networks had put further a major challenge of security that need to be investigated. This article presents a study on security attacks and requirements needed to ensure security in UAV-based fog networks. We provide blockchain security in UAV-based fog computing to secure a large volume of data. The communicated data is stored in the form of blocks with hash functions, which guarantee security in the network. Thus, the aim of blockchain security is to guarantee that any hostile third party cannot corrupt or change the live missions or tasks allocated to actual UAV–Fog nodes.


Subscribers can view annotate, and download all of SAE's content. Learn More »


Members save up to 19% off list price.
Login to see discount.